General

  • Target

    3b9380136a78bbcaddb4b35df124ff4bc6843448b663435e74208f2f8e443649N

  • Size

    80KB

  • Sample

    241004-h5tw6svfme

  • MD5

    3a34fff5558946f770cd4c5aefb030b0

  • SHA1

    cda1596e44a0f29c683f533b2c11ba9f03e90673

  • SHA256

    3b9380136a78bbcaddb4b35df124ff4bc6843448b663435e74208f2f8e443649

  • SHA512

    3917a8dceebda87e66901341d6002858ffdee1b7cd6d625b5b5e083c1ba8878dbc2e2e5040abce4b7a936d50e1e7ab173b01600d734b4c39108c8f697355fbb6

  • SSDEEP

    768:UDB4tow5DMLPGWmKULeVagylnly/LtQOmmKsjYy6nPQfg3MVNJ5EpRM7di/F:amawNMLPFULeVXely/xsmZYZofAeWF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ngm.ddns.net:6060

Mutex

42b6019350ac5d33a1fa8d0a74849f88

Attributes
  • reg_key

    42b6019350ac5d33a1fa8d0a74849f88

  • splitter

    |'|'|

Targets

    • Target

      3b9380136a78bbcaddb4b35df124ff4bc6843448b663435e74208f2f8e443649N

    • Size

      80KB

    • MD5

      3a34fff5558946f770cd4c5aefb030b0

    • SHA1

      cda1596e44a0f29c683f533b2c11ba9f03e90673

    • SHA256

      3b9380136a78bbcaddb4b35df124ff4bc6843448b663435e74208f2f8e443649

    • SHA512

      3917a8dceebda87e66901341d6002858ffdee1b7cd6d625b5b5e083c1ba8878dbc2e2e5040abce4b7a936d50e1e7ab173b01600d734b4c39108c8f697355fbb6

    • SSDEEP

      768:UDB4tow5DMLPGWmKULeVagylnly/LtQOmmKsjYy6nPQfg3MVNJ5EpRM7di/F:amawNMLPFULeVXely/xsmZYZofAeWF

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks