General

  • Target

    5dada24e36e7a78f9be85c877d6c49a864ca7feae1c846db966d4e543b0c7fb3N

  • Size

    40KB

  • Sample

    241020-cpawgavdpl

  • MD5

    f0d14609d7e942c1010ec9cfb9036ce0

  • SHA1

    48bf70faab42fc40d2d46ea736bd80b1ca70b5c5

  • SHA256

    5dada24e36e7a78f9be85c877d6c49a864ca7feae1c846db966d4e543b0c7fb3

  • SHA512

    1bc9146cfe05a2e5b157b060a214025048bf47e5647ad83ea7e565b9e0424521baebd49fbbc861c8c8de78e9e8306303dd4758c6cd34bcdc6e43eebc340a98b1

  • SSDEEP

    768:FD71oGc1FRVp74q8HesBKh0p29SgRkSczWVC1xOgT:FD71IPkpZKhG29jkScKVZgT

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HBSG 2

C2

salieri-new.no-ip.biz:999

Mutex

6fe48491caf03390d0c48d6fb6c86d73

Attributes
  • reg_key

    6fe48491caf03390d0c48d6fb6c86d73

  • splitter

    |'|'|

Targets

    • Target

      5dada24e36e7a78f9be85c877d6c49a864ca7feae1c846db966d4e543b0c7fb3N

    • Size

      40KB

    • MD5

      f0d14609d7e942c1010ec9cfb9036ce0

    • SHA1

      48bf70faab42fc40d2d46ea736bd80b1ca70b5c5

    • SHA256

      5dada24e36e7a78f9be85c877d6c49a864ca7feae1c846db966d4e543b0c7fb3

    • SHA512

      1bc9146cfe05a2e5b157b060a214025048bf47e5647ad83ea7e565b9e0424521baebd49fbbc861c8c8de78e9e8306303dd4758c6cd34bcdc6e43eebc340a98b1

    • SSDEEP

      768:FD71oGc1FRVp74q8HesBKh0p29SgRkSczWVC1xOgT:FD71IPkpZKhG29jkScKVZgT

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks