General

  • Target

    a2f3108c3c2c32f1b9ae75f694d1ee15a2647b2ce3d65f6df9bccaf426fb7af1.exe

  • Size

    31KB

  • Sample

    241006-m8fwyavfjb

  • MD5

    f1ffbad1441a7f3368c551402e04fa03

  • SHA1

    73a33bf9e4a2cde9a8468a2eed78f9eae3bb5e54

  • SHA256

    a2f3108c3c2c32f1b9ae75f694d1ee15a2647b2ce3d65f6df9bccaf426fb7af1

  • SHA512

    0b4b7a93d8c7711abae6f5f271f566d0c3a0631749cd7e1050be233131f4d9f9e3ccecfd94ab3c17ee12d7bbad8969f0b5fe6a9179c0bcf61f201d99c504f052

  • SSDEEP

    768:bis2ZOVvZVYzxDCPIAT+vCQEpvywHQmIDUu0tizgj:c+6qJQ6DQVk5j

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

deme

C2

192.168.1.34:4444

Mutex

4a511581dfdc310e4c48feb89e0695f4

Attributes
  • reg_key

    4a511581dfdc310e4c48feb89e0695f4

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      a2f3108c3c2c32f1b9ae75f694d1ee15a2647b2ce3d65f6df9bccaf426fb7af1.exe

    • Size

      31KB

    • MD5

      f1ffbad1441a7f3368c551402e04fa03

    • SHA1

      73a33bf9e4a2cde9a8468a2eed78f9eae3bb5e54

    • SHA256

      a2f3108c3c2c32f1b9ae75f694d1ee15a2647b2ce3d65f6df9bccaf426fb7af1

    • SHA512

      0b4b7a93d8c7711abae6f5f271f566d0c3a0631749cd7e1050be233131f4d9f9e3ccecfd94ab3c17ee12d7bbad8969f0b5fe6a9179c0bcf61f201d99c504f052

    • SSDEEP

      768:bis2ZOVvZVYzxDCPIAT+vCQEpvywHQmIDUu0tizgj:c+6qJQ6DQVk5j

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks