General

  • Target

    34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2

  • Size

    523KB

  • Sample

    241018-xwbfsstdmf

  • MD5

    8303fbef6e3918300a97bdce8f902dac

  • SHA1

    a7aab55f0753fd4ab2961c21abd3eddf27acc8f2

  • SHA256

    34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2

  • SHA512

    f3e4dcf49b712e067af05eb34fe7d5c56c1b879da32e98cdae8f02a1cd60d3b2415c9723051129995e65dbd54a683a11f3079e47b1bd50a9e32941da426cea39

  • SSDEEP

    12288:dToPWBv/cpGrU3y/S9U7DzInZEiQIG/V/1WkRZ4p3nq6:dTbBv5rUQDzIntQIIF47

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

172.29.192.1:7733

Mutex

af8521d58cef2cc5d6031d0e5bd8a950

Attributes
  • reg_key

    af8521d58cef2cc5d6031d0e5bd8a950

  • splitter

    |'|'|

Targets

    • Target

      34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2

    • Size

      523KB

    • MD5

      8303fbef6e3918300a97bdce8f902dac

    • SHA1

      a7aab55f0753fd4ab2961c21abd3eddf27acc8f2

    • SHA256

      34f7f28ba032182b6791f6715af122c721f8faf65abeebc4916b75d92b4525a2

    • SHA512

      f3e4dcf49b712e067af05eb34fe7d5c56c1b879da32e98cdae8f02a1cd60d3b2415c9723051129995e65dbd54a683a11f3079e47b1bd50a9e32941da426cea39

    • SSDEEP

      12288:dToPWBv/cpGrU3y/S9U7DzInZEiQIG/V/1WkRZ4p3nq6:dTbBv5rUQDzIntQIIF47

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks