General

  • Target

    14cfe3818e80267c2768d98d589471f52e3fc1bc94cfd54f36ae592a15769b73N

  • Size

    23KB

  • Sample

    241019-qp589sybna

  • MD5

    36e8df4d9817ff097f677b87b9dd7b30

  • SHA1

    924bfe7fe83eff031ce00ff71265cd96014113c0

  • SHA256

    14cfe3818e80267c2768d98d589471f52e3fc1bc94cfd54f36ae592a15769b73

  • SHA512

    5678f20346daf9ebffc4e01f8e7fc490802ee8cdbbe31e83ea2c88dfe6bf0612d0ffe6d0962b3020a91a27b50f7aed7312d99cf9fcfc24d90828cd80c44639ec

  • SSDEEP

    384:sQ+ILgIbOprgPsUOSU0kB1kd6Lg7GYh/JomRvR6JZlbw8hqIusZzZBx:/LL6MVU0XRpcnuw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.0.2.7:5552

Mutex

83d06845e55bd392660f4407b1ed1cd0

Attributes
  • reg_key

    83d06845e55bd392660f4407b1ed1cd0

  • splitter

    |'|'|

Targets

    • Target

      14cfe3818e80267c2768d98d589471f52e3fc1bc94cfd54f36ae592a15769b73N

    • Size

      23KB

    • MD5

      36e8df4d9817ff097f677b87b9dd7b30

    • SHA1

      924bfe7fe83eff031ce00ff71265cd96014113c0

    • SHA256

      14cfe3818e80267c2768d98d589471f52e3fc1bc94cfd54f36ae592a15769b73

    • SHA512

      5678f20346daf9ebffc4e01f8e7fc490802ee8cdbbe31e83ea2c88dfe6bf0612d0ffe6d0962b3020a91a27b50f7aed7312d99cf9fcfc24d90828cd80c44639ec

    • SSDEEP

      384:sQ+ILgIbOprgPsUOSU0kB1kd6Lg7GYh/JomRvR6JZlbw8hqIusZzZBx:/LL6MVU0XRpcnuw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks