General

  • Target

    47fa3a13a28ee3b5f875924cc9dfa37d09ed23150c69696e2521abaf8dc84613N

  • Size

    37KB

  • Sample

    241009-gqbllswdkj

  • MD5

    d1babc8145b6ade05b22da25f375ebc0

  • SHA1

    8e419eb4020e8ae34b996653b7ba3aec5baa8c46

  • SHA256

    47fa3a13a28ee3b5f875924cc9dfa37d09ed23150c69696e2521abaf8dc84613

  • SHA512

    95e1c078fe59c6229db301b921563bd611eba7d26a5d649ef45c4128f9a79e7048c8a9620938be39065a584f547acb327f3ac5c48f5cce062896fb851365d682

  • SSDEEP

    384:ReLpCT0i9NdTe/kCOyU7NuvLmDPM+7rAF+rMRTyN/0L+EcoinblneHQM3epzXzMw:ILaT1CFU7NuKbMgrM+rMRa8Nu1Mwt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      47fa3a13a28ee3b5f875924cc9dfa37d09ed23150c69696e2521abaf8dc84613N

    • Size

      37KB

    • MD5

      d1babc8145b6ade05b22da25f375ebc0

    • SHA1

      8e419eb4020e8ae34b996653b7ba3aec5baa8c46

    • SHA256

      47fa3a13a28ee3b5f875924cc9dfa37d09ed23150c69696e2521abaf8dc84613

    • SHA512

      95e1c078fe59c6229db301b921563bd611eba7d26a5d649ef45c4128f9a79e7048c8a9620938be39065a584f547acb327f3ac5c48f5cce062896fb851365d682

    • SSDEEP

      384:ReLpCT0i9NdTe/kCOyU7NuvLmDPM+7rAF+rMRTyN/0L+EcoinblneHQM3epzXzMw:ILaT1CFU7NuKbMgrM+rMRa8Nu1Mwt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks