General

  • Target

    1113b1b6191d4d358d9d09c960a3d03b79011f633f2a45d7bce2fcaedee41f67N

  • Size

    84KB

  • Sample

    241004-kw5neszapc

  • MD5

    c7351f9cd4c20dbef223c537760a6290

  • SHA1

    cc4c4dde4c4eb43357f2e5cd47c357b02ab948be

  • SHA256

    1113b1b6191d4d358d9d09c960a3d03b79011f633f2a45d7bce2fcaedee41f67

  • SHA512

    6cd4cc38b2f99cf2342a9c2305f7e06b5c0f49c81ff90863df68c7ad6a1a85ece1116acf120cf908eadc5026da684f0a363eaa7f472fd2545249467aaf63de57

  • SSDEEP

    1536:KX4CF2rk2f9I/MRJ87xbBXT9kVaF6/6fLSLve2tYTZDKL0mEwPC:KN2ue+b8VaFtQGTZDKP7PC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

212683d986fb740ad6a40184df48e604

Attributes
  • reg_key

    212683d986fb740ad6a40184df48e604

  • splitter

    |'|'|

Targets

    • Target

      1113b1b6191d4d358d9d09c960a3d03b79011f633f2a45d7bce2fcaedee41f67N

    • Size

      84KB

    • MD5

      c7351f9cd4c20dbef223c537760a6290

    • SHA1

      cc4c4dde4c4eb43357f2e5cd47c357b02ab948be

    • SHA256

      1113b1b6191d4d358d9d09c960a3d03b79011f633f2a45d7bce2fcaedee41f67

    • SHA512

      6cd4cc38b2f99cf2342a9c2305f7e06b5c0f49c81ff90863df68c7ad6a1a85ece1116acf120cf908eadc5026da684f0a363eaa7f472fd2545249467aaf63de57

    • SSDEEP

      1536:KX4CF2rk2f9I/MRJ87xbBXT9kVaF6/6fLSLve2tYTZDKL0mEwPC:KN2ue+b8VaFtQGTZDKP7PC

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks