General

  • Target

    307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN

  • Size

    936KB

  • Sample

    241001-d3ra2sybqq

  • MD5

    4f66f2d3347a0466104e506a6d71f1b0

  • SHA1

    63d77b6043bfcfa477d743a30c3476997f6dcf09

  • SHA256

    307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ce

  • SHA512

    10c7a1e0477830cdcc40a385a40ef884e2bb9ab3e2d1ecebee1e9760d9615d035fc2b55d3b9c9c81b3aeddedbb1ab0c869a00d278653ca59344059feea3bc660

  • SSDEEP

    12288:9MdXQ94Gh9tkeWMsMQ3WmvekJTaS9ynMpx5hum+yw0DMdXQ94Gh9tkeWMsMQ3Wm9:af7XHuPf7XHu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

22.ip.gl.ply.gg:57731

Mutex

32ce84f74d25f1e71aac67667a2c8d24

Attributes
  • reg_key

    32ce84f74d25f1e71aac67667a2c8d24

  • splitter

    |'|'|

Targets

    • Target

      307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ceN

    • Size

      936KB

    • MD5

      4f66f2d3347a0466104e506a6d71f1b0

    • SHA1

      63d77b6043bfcfa477d743a30c3476997f6dcf09

    • SHA256

      307b96d57138b6d00f497d65316874c5c93a734fd4e3d97e8c6beb33afba87ce

    • SHA512

      10c7a1e0477830cdcc40a385a40ef884e2bb9ab3e2d1ecebee1e9760d9615d035fc2b55d3b9c9c81b3aeddedbb1ab0c869a00d278653ca59344059feea3bc660

    • SSDEEP

      12288:9MdXQ94Gh9tkeWMsMQ3WmvekJTaS9ynMpx5hum+yw0DMdXQ94Gh9tkeWMsMQ3Wm9:af7XHuPf7XHu

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks