General

  • Target

    920872696e5911393610e0f5967c530a197c2ec43fa1f0ad30792712e8f3f019.exe

  • Size

    23KB

  • Sample

    241006-mxff2azdrl

  • MD5

    a63f4904086eef25d893931a1d85db94

  • SHA1

    b5352ea9de91d7d106f62a9f012e893423a00646

  • SHA256

    920872696e5911393610e0f5967c530a197c2ec43fa1f0ad30792712e8f3f019

  • SHA512

    48472562a07994708067d4ea0187b6d0fc038f1a4e1a6f7caaa9273ff1dfb8fff11ad6923a0db34a1526f5b1cf402bdbf4cadb75da14d61adb09e36bcbdfb2c2

  • SSDEEP

    384:QbNfSgxbOprgPdUOSU0kqmkd6agwGNbeJ0mRvR6JZlbw8hqIusZzZnd:8S+6BVU01Rpcnuy

Malware Config

Extracted

Family

njrat

Version

0.7d

C2

45.76.29.16:5552

Mutex

738e6a0cd25e647b7eb7d6cdad689401

Attributes
  • reg_key

    738e6a0cd25e647b7eb7d6cdad689401

  • splitter

    |'|'|

Targets

    • Target

      920872696e5911393610e0f5967c530a197c2ec43fa1f0ad30792712e8f3f019.exe

    • Size

      23KB

    • MD5

      a63f4904086eef25d893931a1d85db94

    • SHA1

      b5352ea9de91d7d106f62a9f012e893423a00646

    • SHA256

      920872696e5911393610e0f5967c530a197c2ec43fa1f0ad30792712e8f3f019

    • SHA512

      48472562a07994708067d4ea0187b6d0fc038f1a4e1a6f7caaa9273ff1dfb8fff11ad6923a0db34a1526f5b1cf402bdbf4cadb75da14d61adb09e36bcbdfb2c2

    • SSDEEP

      384:QbNfSgxbOprgPdUOSU0kqmkd6agwGNbeJ0mRvR6JZlbw8hqIusZzZnd:8S+6BVU01Rpcnuy

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks