General

  • Target

    4cdb8ea9bfcd17c4b42eeafde89dc21e2a244a50946138e9a0e97148d5170fa4N

  • Size

    149KB

  • Sample

    241001-19bkhatbln

  • MD5

    7cd5aec7d50c36ff8b7a1cd2545e9d40

  • SHA1

    2a545dc6ee9e166059684ba136eb094a21f55cd3

  • SHA256

    4cdb8ea9bfcd17c4b42eeafde89dc21e2a244a50946138e9a0e97148d5170fa4

  • SHA512

    533d4b685bd0e995502fd86ef0b577b644c8589556666ad3f8cfa62ff60957bbeb13aee57239c1fbc487c68cf841ddbe22289c54c9115029268451d30e098e39

  • SSDEEP

    3072:Rur5wStpC66ZL7oIu8F++9iFbatfoT0qurpcT0mdiG0wpyTMDRKSTwBOKJjCMs7M:GvIl9gtyTMNBTwB7HYIighXzXD

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      4cdb8ea9bfcd17c4b42eeafde89dc21e2a244a50946138e9a0e97148d5170fa4N

    • Size

      149KB

    • MD5

      7cd5aec7d50c36ff8b7a1cd2545e9d40

    • SHA1

      2a545dc6ee9e166059684ba136eb094a21f55cd3

    • SHA256

      4cdb8ea9bfcd17c4b42eeafde89dc21e2a244a50946138e9a0e97148d5170fa4

    • SHA512

      533d4b685bd0e995502fd86ef0b577b644c8589556666ad3f8cfa62ff60957bbeb13aee57239c1fbc487c68cf841ddbe22289c54c9115029268451d30e098e39

    • SSDEEP

      3072:Rur5wStpC66ZL7oIu8F++9iFbatfoT0qurpcT0mdiG0wpyTMDRKSTwBOKJjCMs7M:GvIl9gtyTMNBTwB7HYIighXzXD

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks