General

  • Target

    9ce9e3621e7316d686305fbf8ec1e693d1ae1790a3a5cad55d2a2f6fc5fc87d9

  • Size

    120KB

  • Sample

    241008-a74v6azhrm

  • MD5

    1fc0f7a1465c2a69faf251bbb6661306

  • SHA1

    704f592c3d043445113ed8f67d725b0baf6c9e8e

  • SHA256

    9ce9e3621e7316d686305fbf8ec1e693d1ae1790a3a5cad55d2a2f6fc5fc87d9

  • SHA512

    127dfa37982dee27c363803f6a6d9f07b0e57ba394168adc995ffe8ab11d738dfa993ab6ad0517a3dee32cb1478db113e420f364031d79dd1fde31b759e8bc06

  • SSDEEP

    3072:aOH35mUhTnavqZEk2Yxfp2KCR2pkkEKVI6I:3pmUR2Yx0j9GI

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

ships-masters.gl.at.ply.gg:40082

Mutex

8515eb34d8f9de5af815466e9715b3e5

Attributes
  • reg_key

    8515eb34d8f9de5af815466e9715b3e5

  • splitter

    |'|'|

Targets

    • Target

      9ce9e3621e7316d686305fbf8ec1e693d1ae1790a3a5cad55d2a2f6fc5fc87d9

    • Size

      120KB

    • MD5

      1fc0f7a1465c2a69faf251bbb6661306

    • SHA1

      704f592c3d043445113ed8f67d725b0baf6c9e8e

    • SHA256

      9ce9e3621e7316d686305fbf8ec1e693d1ae1790a3a5cad55d2a2f6fc5fc87d9

    • SHA512

      127dfa37982dee27c363803f6a6d9f07b0e57ba394168adc995ffe8ab11d738dfa993ab6ad0517a3dee32cb1478db113e420f364031d79dd1fde31b759e8bc06

    • SSDEEP

      3072:aOH35mUhTnavqZEk2Yxfp2KCR2pkkEKVI6I:3pmUR2Yx0j9GI

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks