General

  • Target

    96284e71b6a2d451924ddd26fe04d1d093670546d5d340b1cdec543302921c52

  • Size

    23KB

  • Sample

    241021-a3333a1fpp

  • MD5

    093b65a2543d67f8e7bdca5eb35515db

  • SHA1

    5e265e98a54b835e623c0b3c05ee9de9fc61eab6

  • SHA256

    96284e71b6a2d451924ddd26fe04d1d093670546d5d340b1cdec543302921c52

  • SHA512

    c040bcc8bf570e6f9a8dc4e20413480e40540568a7ef684f3888addf8270439aac84fc5b112b05905cb8536ce93df7c9f83d01152eeddba6ac745bde7a0039e5

  • SSDEEP

    384:BY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZu1:2L2s+tRyRpcnu1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

mohib

C2

127.0.0.1:1978

Mutex

a0b72362103f09d1b009d939c194f0ce

Attributes
  • reg_key

    a0b72362103f09d1b009d939c194f0ce

  • splitter

    |'|'|

Targets

    • Target

      96284e71b6a2d451924ddd26fe04d1d093670546d5d340b1cdec543302921c52

    • Size

      23KB

    • MD5

      093b65a2543d67f8e7bdca5eb35515db

    • SHA1

      5e265e98a54b835e623c0b3c05ee9de9fc61eab6

    • SHA256

      96284e71b6a2d451924ddd26fe04d1d093670546d5d340b1cdec543302921c52

    • SHA512

      c040bcc8bf570e6f9a8dc4e20413480e40540568a7ef684f3888addf8270439aac84fc5b112b05905cb8536ce93df7c9f83d01152eeddba6ac745bde7a0039e5

    • SSDEEP

      384:BY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZu1:2L2s+tRyRpcnu1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks