General

  • Target

    a7356edf0a0c0a2b003ade063ff5d8817c9d73fc3a7b4f4605f03d44cfd602fcN

  • Size

    55KB

  • Sample

    241002-jawmysxgne

  • MD5

    7d38e6e8b44aac1d4e7a3eb659837520

  • SHA1

    5a7c139618c8eb4ceb1e897a9e41b5cafceaf465

  • SHA256

    a7356edf0a0c0a2b003ade063ff5d8817c9d73fc3a7b4f4605f03d44cfd602fc

  • SHA512

    ae76d28657016ef48aad993ba53ee34a1ccba6f9c8af70ad9b458b3e877b828015ec8f8fd3585b25a579d4cf1aaf5c9e3c9e28b5b6fcf133b67afc4439a6e78b

  • SSDEEP

    768:l7kOpEBhA/vMHTi9bDIS+FPPPPrnMXOFc8pnD+orPPPPP:dkOpvnYi9boMXOFcMD+o

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

تم الاختراق من قبل احمد السيسي

C2

mmo7m.ddns.net:7777

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      a7356edf0a0c0a2b003ade063ff5d8817c9d73fc3a7b4f4605f03d44cfd602fcN

    • Size

      55KB

    • MD5

      7d38e6e8b44aac1d4e7a3eb659837520

    • SHA1

      5a7c139618c8eb4ceb1e897a9e41b5cafceaf465

    • SHA256

      a7356edf0a0c0a2b003ade063ff5d8817c9d73fc3a7b4f4605f03d44cfd602fc

    • SHA512

      ae76d28657016ef48aad993ba53ee34a1ccba6f9c8af70ad9b458b3e877b828015ec8f8fd3585b25a579d4cf1aaf5c9e3c9e28b5b6fcf133b67afc4439a6e78b

    • SSDEEP

      768:l7kOpEBhA/vMHTi9bDIS+FPPPPrnMXOFc8pnD+orPPPPP:dkOpvnYi9boMXOFcMD+o

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks