General

  • Target

    aae3c9257e55dc25861fe04de3ea21b07420396d76f277a3d2d61884c52a3e30N

  • Size

    23KB

  • Sample

    241014-zprwbawcmc

  • MD5

    40cf0a7718299af134ac9ac606ac89a0

  • SHA1

    16eed8b7c444b7ee475ccd7332de233b3a7ec02e

  • SHA256

    aae3c9257e55dc25861fe04de3ea21b07420396d76f277a3d2d61884c52a3e30

  • SHA512

    2f6e36e32b7ca48969ed31adbf1b75107c6affa62933ac9d70696423cb50c882e8f9a022f01e96d4f6900e56ca4df189712a4b00e6d59fff1f071d2fca517aab

  • SSDEEP

    384:boWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIb:07O89p2rRpcnuV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      aae3c9257e55dc25861fe04de3ea21b07420396d76f277a3d2d61884c52a3e30N

    • Size

      23KB

    • MD5

      40cf0a7718299af134ac9ac606ac89a0

    • SHA1

      16eed8b7c444b7ee475ccd7332de233b3a7ec02e

    • SHA256

      aae3c9257e55dc25861fe04de3ea21b07420396d76f277a3d2d61884c52a3e30

    • SHA512

      2f6e36e32b7ca48969ed31adbf1b75107c6affa62933ac9d70696423cb50c882e8f9a022f01e96d4f6900e56ca4df189712a4b00e6d59fff1f071d2fca517aab

    • SSDEEP

      384:boWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIb:07O89p2rRpcnuV

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks