General

  • Target

    8f2a8e17d6c466f2907213c1627e1fff8147c57eadf67012771741f290a32b6aN

  • Size

    38KB

  • Sample

    240930-mbvzlathjd

  • MD5

    0af2a1b653c84f11f76f9fe6c5faff00

  • SHA1

    9def20d00191262a517dc67c6c59c4edfc9f3fcc

  • SHA256

    8f2a8e17d6c466f2907213c1627e1fff8147c57eadf67012771741f290a32b6a

  • SHA512

    be71fe59b9cdd67ebfab14d64d2d570d7d6f78fec9365417c48dd7b79c63fb691419a0e55850d7d1710a4823b464952611d661ff44145c333062a53ad9ff2846

  • SSDEEP

    768:HDvHfwFMwnQma7vppr6qKncR5wGBA39c2gYmK72Ihe:TH4MwaPrNKnWuG69c2ry

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      8f2a8e17d6c466f2907213c1627e1fff8147c57eadf67012771741f290a32b6aN

    • Size

      38KB

    • MD5

      0af2a1b653c84f11f76f9fe6c5faff00

    • SHA1

      9def20d00191262a517dc67c6c59c4edfc9f3fcc

    • SHA256

      8f2a8e17d6c466f2907213c1627e1fff8147c57eadf67012771741f290a32b6a

    • SHA512

      be71fe59b9cdd67ebfab14d64d2d570d7d6f78fec9365417c48dd7b79c63fb691419a0e55850d7d1710a4823b464952611d661ff44145c333062a53ad9ff2846

    • SSDEEP

      768:HDvHfwFMwnQma7vppr6qKncR5wGBA39c2gYmK72Ihe:TH4MwaPrNKnWuG69c2ry

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks