General

  • Target

    bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063N

  • Size

    23KB

  • Sample

    241019-ptdt5sybkj

  • MD5

    b71d1c2b3678ffbf530d0253379febc0

  • SHA1

    71fb2a454ffc903f2a5de5c68d71852d9b7b361b

  • SHA256

    bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063

  • SHA512

    e7c54e2777a40ad3053f896e3de592b168f2750811276bacd2b2b23f77887f643881b48ae52076bdef33d762348be1627b60c9b3c89f97e6438d23eb525b942c

  • SSDEEP

    384:awTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZxV/j:5vZiBK1edJRpcnuYl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

motisyoink.ddns.net:3332

Mutex

b7eb86012438665b417c92deefecaa88

Attributes
  • reg_key

    b7eb86012438665b417c92deefecaa88

  • splitter

    |'|'|

Targets

    • Target

      bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063N

    • Size

      23KB

    • MD5

      b71d1c2b3678ffbf530d0253379febc0

    • SHA1

      71fb2a454ffc903f2a5de5c68d71852d9b7b361b

    • SHA256

      bbe408f935e2b4a54b0a22ebcb1746fa567016e00652a66b79c8d257afc37063

    • SHA512

      e7c54e2777a40ad3053f896e3de592b168f2750811276bacd2b2b23f77887f643881b48ae52076bdef33d762348be1627b60c9b3c89f97e6438d23eb525b942c

    • SSDEEP

      384:awTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZxV/j:5vZiBK1edJRpcnuYl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks