General

  • Target

    3f8b1f4d1c42bcaed4a709ef637e7f6853c6715dfb0d12b484dec5fdee2c8717N

  • Size

    23KB

  • Sample

    241005-gc4egasfmd

  • MD5

    e31c0b9b4e622689403675985761b9c0

  • SHA1

    56931405ba252d390706d6d09687edfd8e0c8001

  • SHA256

    3f8b1f4d1c42bcaed4a709ef637e7f6853c6715dfb0d12b484dec5fdee2c8717

  • SHA512

    e39e066f6934dc20e40c235438d247a768b02d35378bf936fce4f9c05ea831bbc082445cc382ce3e2af9fdec8965d86519f2c4947822059cd20856f54261adce

  • SSDEEP

    384:8oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIn:r7O89p2rRpcnud

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      3f8b1f4d1c42bcaed4a709ef637e7f6853c6715dfb0d12b484dec5fdee2c8717N

    • Size

      23KB

    • MD5

      e31c0b9b4e622689403675985761b9c0

    • SHA1

      56931405ba252d390706d6d09687edfd8e0c8001

    • SHA256

      3f8b1f4d1c42bcaed4a709ef637e7f6853c6715dfb0d12b484dec5fdee2c8717

    • SHA512

      e39e066f6934dc20e40c235438d247a768b02d35378bf936fce4f9c05ea831bbc082445cc382ce3e2af9fdec8965d86519f2c4947822059cd20856f54261adce

    • SSDEEP

      384:8oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIn:r7O89p2rRpcnud

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks