General

  • Target

    d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0N

  • Size

    23KB

  • Sample

    241019-fm311s1bmn

  • MD5

    73553f0520d2bbb090228f78a93cd670

  • SHA1

    0529a9d3fbac2784ba161827d14c31eae8f2f1ba

  • SHA256

    d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0

  • SHA512

    fab4f004efebe2eccc375269a82d6a94e6dc4be00c6b4c5d27a9b012fd64f39c1017932868951012818f2342873798245d163c9bd0fb1021bab578ccc9223184

  • SSDEEP

    384:3W3qbCKml4hoo9IMVCGpOsjhEv6/ghrrgOpt3xmRvR6JZlbw8hqIusZzZyK:3SN0aatpAnARpcnuC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

https://7841104bb6360028d935dfc9e856a4db.serveo.net:7777

Mutex

1e3469295dc52f6e1f2bb96a187dfd66

Attributes
  • reg_key

    1e3469295dc52f6e1f2bb96a187dfd66

  • splitter

    |'|'|

Targets

    • Target

      d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0N

    • Size

      23KB

    • MD5

      73553f0520d2bbb090228f78a93cd670

    • SHA1

      0529a9d3fbac2784ba161827d14c31eae8f2f1ba

    • SHA256

      d79b50d337f0683e44b1c0ed18dcbaf9a85bcaa04ad0671c12a33736681d21c0

    • SHA512

      fab4f004efebe2eccc375269a82d6a94e6dc4be00c6b4c5d27a9b012fd64f39c1017932868951012818f2342873798245d163c9bd0fb1021bab578ccc9223184

    • SSDEEP

      384:3W3qbCKml4hoo9IMVCGpOsjhEv6/ghrrgOpt3xmRvR6JZlbw8hqIusZzZyK:3SN0aatpAnARpcnuC

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks