General

  • Target

    c124cd29fc533e37c22296aa6a359e383bdfac83523c35522301528c00c288e7N

  • Size

    23KB

  • Sample

    241018-2l82jathrp

  • MD5

    68c474e6a6ecf35587d3ae37db2e17a0

  • SHA1

    6c9b3fee83da595cf4cb9e079651900816359aaf

  • SHA256

    c124cd29fc533e37c22296aa6a359e383bdfac83523c35522301528c00c288e7

  • SHA512

    35dcdab365deea92f9ba42b893cc1eb785240b4d104479aae42bb478566fe07a8a26ea4a9b8adae3b55048ff17cd45813f0ca6f855853f389ef1ceec0c9670c0

  • SSDEEP

    384:7oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIK:U7O89p2rRpcnuQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      c124cd29fc533e37c22296aa6a359e383bdfac83523c35522301528c00c288e7N

    • Size

      23KB

    • MD5

      68c474e6a6ecf35587d3ae37db2e17a0

    • SHA1

      6c9b3fee83da595cf4cb9e079651900816359aaf

    • SHA256

      c124cd29fc533e37c22296aa6a359e383bdfac83523c35522301528c00c288e7

    • SHA512

      35dcdab365deea92f9ba42b893cc1eb785240b4d104479aae42bb478566fe07a8a26ea4a9b8adae3b55048ff17cd45813f0ca6f855853f389ef1ceec0c9670c0

    • SSDEEP

      384:7oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIK:U7O89p2rRpcnuQ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks