General

  • Target

    7d4cf2d2eb4ce89c7a1d17bf3d29443bc5e6f4ccc7bd5ea42e980cc672385449N

  • Size

    23KB

  • Sample

    241001-yed12a1bmb

  • MD5

    e9c7dd393dee3367ec1c30c838c0e2e0

  • SHA1

    5848612cfe878af436fa4b0f4220b16c5e0b6fa0

  • SHA256

    7d4cf2d2eb4ce89c7a1d17bf3d29443bc5e6f4ccc7bd5ea42e980cc672385449

  • SHA512

    db4b889d88b73eab5259dd51b4adc6b806cce2bdca5fa40adcbdd989db3c1a9bca79db263e19aaa2da4570ba4db108285e79d86f4c8594b2be0b66f9bd429f45

  • SSDEEP

    384:9oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIo:i7O89p2rRpcnuu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      7d4cf2d2eb4ce89c7a1d17bf3d29443bc5e6f4ccc7bd5ea42e980cc672385449N

    • Size

      23KB

    • MD5

      e9c7dd393dee3367ec1c30c838c0e2e0

    • SHA1

      5848612cfe878af436fa4b0f4220b16c5e0b6fa0

    • SHA256

      7d4cf2d2eb4ce89c7a1d17bf3d29443bc5e6f4ccc7bd5ea42e980cc672385449

    • SHA512

      db4b889d88b73eab5259dd51b4adc6b806cce2bdca5fa40adcbdd989db3c1a9bca79db263e19aaa2da4570ba4db108285e79d86f4c8594b2be0b66f9bd429f45

    • SSDEEP

      384:9oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIo:i7O89p2rRpcnuu

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks