General

  • Target

    e228931cf49e7791c04db0dfa28ee0e76497ab44201bdbee5f6f575791f79e94N

  • Size

    23KB

  • Sample

    241001-rgl14atbkm

  • MD5

    782674105b6f7395dbc4c086051be7e0

  • SHA1

    351a805ccdcd69208b7ac08f2e0c5fc49b86cdd0

  • SHA256

    e228931cf49e7791c04db0dfa28ee0e76497ab44201bdbee5f6f575791f79e94

  • SHA512

    8c2768cbedf0a650437fdb5868720497556d0fd7c2dabec5231b50d2b03c823313c370a1c38774e17f72fbbec0d9f44e99ea95e157a8ab5604902bee20b9b05d

  • SSDEEP

    384:w8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZp/:/Xcwt3tRpcnum

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1978

Mutex

33f9e1d6fefce618b71a50ca08e3da67

Attributes
  • reg_key

    33f9e1d6fefce618b71a50ca08e3da67

  • splitter

    |'|'|

Targets

    • Target

      e228931cf49e7791c04db0dfa28ee0e76497ab44201bdbee5f6f575791f79e94N

    • Size

      23KB

    • MD5

      782674105b6f7395dbc4c086051be7e0

    • SHA1

      351a805ccdcd69208b7ac08f2e0c5fc49b86cdd0

    • SHA256

      e228931cf49e7791c04db0dfa28ee0e76497ab44201bdbee5f6f575791f79e94

    • SHA512

      8c2768cbedf0a650437fdb5868720497556d0fd7c2dabec5231b50d2b03c823313c370a1c38774e17f72fbbec0d9f44e99ea95e157a8ab5604902bee20b9b05d

    • SSDEEP

      384:w8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZp/:/Xcwt3tRpcnum

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks