General

  • Target

    2b54d8ac1e78e75cc3737fe24ed0ad4ad558033f76feb1cee362b90fc215fbed.exe

  • Size

    23KB

  • Sample

    241001-rz5adsydng

  • MD5

    33fa48b8911aa5aae81600d27c8956b1

  • SHA1

    946ae9762e1535fc2829bcfa36efd7687924e001

  • SHA256

    2b54d8ac1e78e75cc3737fe24ed0ad4ad558033f76feb1cee362b90fc215fbed

  • SHA512

    4fb2d8611a22508066f4ae60684030615676b148c447f55b9f27e15624e67c093fef0885d014c031043be9b2c1beaae2da50980aec6544e7ed43bb1d8e592be7

  • SSDEEP

    384:/sqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZ5VVU:0SoQA6mlcrRpcnuCVO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

JohnRicardomilos-33746.portmap.io:1605

Mutex

fe893b4a0c6852ab0746b97fce104bb9

Attributes
  • reg_key

    fe893b4a0c6852ab0746b97fce104bb9

  • splitter

    |'|'|

Targets

    • Target

      2b54d8ac1e78e75cc3737fe24ed0ad4ad558033f76feb1cee362b90fc215fbed.exe

    • Size

      23KB

    • MD5

      33fa48b8911aa5aae81600d27c8956b1

    • SHA1

      946ae9762e1535fc2829bcfa36efd7687924e001

    • SHA256

      2b54d8ac1e78e75cc3737fe24ed0ad4ad558033f76feb1cee362b90fc215fbed

    • SHA512

      4fb2d8611a22508066f4ae60684030615676b148c447f55b9f27e15624e67c093fef0885d014c031043be9b2c1beaae2da50980aec6544e7ed43bb1d8e592be7

    • SSDEEP

      384:/sqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZ5VVU:0SoQA6mlcrRpcnuCVO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks