General

  • Target

    ad01160476ded3d8dec827042e6627e5b2a50a4bcf47b37fe892b957de4e149c.exe

  • Size

    37KB

  • Sample

    241006-m6kr4szhrk

  • MD5

    cafebf10a4a9f73bb41a1a357c2a507f

  • SHA1

    482ebb056503f7a34ad16a4ad2ce77f8cab78ba8

  • SHA256

    ad01160476ded3d8dec827042e6627e5b2a50a4bcf47b37fe892b957de4e149c

  • SHA512

    5630065ffd8c3266d8859cbcd3ed0dfeb023f0276665f1015b1a8c0b10fb5ecb7b0a6d142daa891df752e4c472891be77e7c71ece4f46fe25f377e4cd612f772

  • SSDEEP

    384:Lr3G3hUidk+XR21cGMy8Pyip3leFlSusarAF+rMRTyN/0L+EcoinblneHQM3epza:33G3xLGv8PyipcCu3rM+rMRa8NuqLt

Malware Config

Extracted

Family

njrat

Version

Kjh

Botnet

HacKed

C2

180.230.116.72:5552

Mutex

8e3709de950aab92ac1a166058ff0595

Attributes
  • reg_key

    8e3709de950aab92ac1a166058ff0595

  • splitter

    |'|'|

Targets

    • Target

      ad01160476ded3d8dec827042e6627e5b2a50a4bcf47b37fe892b957de4e149c.exe

    • Size

      37KB

    • MD5

      cafebf10a4a9f73bb41a1a357c2a507f

    • SHA1

      482ebb056503f7a34ad16a4ad2ce77f8cab78ba8

    • SHA256

      ad01160476ded3d8dec827042e6627e5b2a50a4bcf47b37fe892b957de4e149c

    • SHA512

      5630065ffd8c3266d8859cbcd3ed0dfeb023f0276665f1015b1a8c0b10fb5ecb7b0a6d142daa891df752e4c472891be77e7c71ece4f46fe25f377e4cd612f772

    • SSDEEP

      384:Lr3G3hUidk+XR21cGMy8Pyip3leFlSusarAF+rMRTyN/0L+EcoinblneHQM3epza:33G3xLGv8PyipcCu3rM+rMRa8NuqLt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks