General

  • Target

    57cb3fc0247614f7c4ba1097892eab4b6925a49a8f37ffe9c2054c485bc5c188N

  • Size

    23KB

  • Sample

    241004-v6pp3axarp

  • MD5

    154ea8b5bfc539b9ed57cad3bce821e0

  • SHA1

    f064f35081e04ae292f455df1abcc0c1ae319e2a

  • SHA256

    57cb3fc0247614f7c4ba1097892eab4b6925a49a8f37ffe9c2054c485bc5c188

  • SHA512

    e1ff4201c8e0c3774f0dabd911738dcf23fda886a0f30d256babbccf234e4172c5636aad7404897ecfd33358ebe301e9d83db20da8ed5082f9dfc06b02430046

  • SSDEEP

    384:bcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZ5l:A30py6vhxaRpcnuU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.107:5555

Mutex

456e48741b8e33d90b3e21f5b318e2a9

Attributes
  • reg_key

    456e48741b8e33d90b3e21f5b318e2a9

  • splitter

    |'|'|

Targets

    • Target

      57cb3fc0247614f7c4ba1097892eab4b6925a49a8f37ffe9c2054c485bc5c188N

    • Size

      23KB

    • MD5

      154ea8b5bfc539b9ed57cad3bce821e0

    • SHA1

      f064f35081e04ae292f455df1abcc0c1ae319e2a

    • SHA256

      57cb3fc0247614f7c4ba1097892eab4b6925a49a8f37ffe9c2054c485bc5c188

    • SHA512

      e1ff4201c8e0c3774f0dabd911738dcf23fda886a0f30d256babbccf234e4172c5636aad7404897ecfd33358ebe301e9d83db20da8ed5082f9dfc06b02430046

    • SSDEEP

      384:bcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZ5l:A30py6vhxaRpcnuU

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks