General

  • Target

    6525ff27f52d27378f0db135543cbda913173c5980fb93d293afe64c5f3e6db9N

  • Size

    23KB

  • Sample

    241012-psx7dsvflm

  • MD5

    f67cd7f637d9f87462f7dfc4639eea20

  • SHA1

    ac1a36c299c621710cec7a268a563c79c6db4831

  • SHA256

    6525ff27f52d27378f0db135543cbda913173c5980fb93d293afe64c5f3e6db9

  • SHA512

    bc7f3ff48dfe685039ec1f32f02990eb3ecc59b7bb0bc1c8366eb135d70381042bed4ad3e643befb2ebef595de4e1fca4d01670065bf9f51adfbb9fa58ee4120

  • SSDEEP

    384:VoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIX:a7O89p2rRpcnuB

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      6525ff27f52d27378f0db135543cbda913173c5980fb93d293afe64c5f3e6db9N

    • Size

      23KB

    • MD5

      f67cd7f637d9f87462f7dfc4639eea20

    • SHA1

      ac1a36c299c621710cec7a268a563c79c6db4831

    • SHA256

      6525ff27f52d27378f0db135543cbda913173c5980fb93d293afe64c5f3e6db9

    • SHA512

      bc7f3ff48dfe685039ec1f32f02990eb3ecc59b7bb0bc1c8366eb135d70381042bed4ad3e643befb2ebef595de4e1fca4d01670065bf9f51adfbb9fa58ee4120

    • SSDEEP

      384:VoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIX:a7O89p2rRpcnuB

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks