General

  • Target

    4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N

  • Size

    543KB

  • Sample

    240930-qmzzga1gmf

  • MD5

    e0645a7fcb592dab2658f800888693a0

  • SHA1

    123bedbc6e4af12908f4ef59fca1ad1af262ffb9

  • SHA256

    4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2

  • SHA512

    62b5c98141db209a8f4f7c88be22893c85c8d23d838d1f65dcd9d3284b19bba737e75ab5e1fc41aab813f7348799d6d4ec5f5a5f49b1153328f5c3bfc93bcca0

  • SSDEEP

    12288:yVQIBRKed0Oa7JHveGg3bdd54VBwKEjA+8e5OXhOSJDVLlwHzz3k9Lac:yhBRKedW7JHveGg3bdv4VBwKEjJ8e5O/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

22.ip.gl.ply.gg:57731

Mutex

32ce84f74d25f1e71aac67667a2c8d24

Attributes
  • reg_key

    32ce84f74d25f1e71aac67667a2c8d24

  • splitter

    |'|'|

Targets

    • Target

      4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2N

    • Size

      543KB

    • MD5

      e0645a7fcb592dab2658f800888693a0

    • SHA1

      123bedbc6e4af12908f4ef59fca1ad1af262ffb9

    • SHA256

      4b648c2427723431eab856e3d42467c714e27cf2affaa99dd932c428094a28d2

    • SHA512

      62b5c98141db209a8f4f7c88be22893c85c8d23d838d1f65dcd9d3284b19bba737e75ab5e1fc41aab813f7348799d6d4ec5f5a5f49b1153328f5c3bfc93bcca0

    • SSDEEP

      12288:yVQIBRKed0Oa7JHveGg3bdd54VBwKEjA+8e5OXhOSJDVLlwHzz3k9Lac:yhBRKedW7JHveGg3bdv4VBwKEjJ8e5O/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks