General

  • Target

    4ab0df4beb4aaca3298b9b8f2c0211392c1e98f13223e433464d1b436edf0befN

  • Size

    23KB

  • Sample

    241019-fzsqta1glm

  • MD5

    ba465955ca8eb149832d1612070e77d0

  • SHA1

    fe32db26675018f082c83dddfff6acdf40eddeb6

  • SHA256

    4ab0df4beb4aaca3298b9b8f2c0211392c1e98f13223e433464d1b436edf0bef

  • SHA512

    372d7b940db44f033206a7900ffc6ccb18ab2decf1b8d31aafe5745fe97b73ea6b8a06aecc3bd25c402fb83288a55dd25cf05e4754724683a9c8ffb8890aee10

  • SSDEEP

    384:3slUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ6u:oeEvwIlLMRpcnuO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.10.10:5552

Mutex

0dc24807523d3cd24b54cd0996e4c49b

Attributes
  • reg_key

    0dc24807523d3cd24b54cd0996e4c49b

  • splitter

    |'|'|

Targets

    • Target

      4ab0df4beb4aaca3298b9b8f2c0211392c1e98f13223e433464d1b436edf0befN

    • Size

      23KB

    • MD5

      ba465955ca8eb149832d1612070e77d0

    • SHA1

      fe32db26675018f082c83dddfff6acdf40eddeb6

    • SHA256

      4ab0df4beb4aaca3298b9b8f2c0211392c1e98f13223e433464d1b436edf0bef

    • SHA512

      372d7b940db44f033206a7900ffc6ccb18ab2decf1b8d31aafe5745fe97b73ea6b8a06aecc3bd25c402fb83288a55dd25cf05e4754724683a9c8ffb8890aee10

    • SSDEEP

      384:3slUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ6u:oeEvwIlLMRpcnuO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks