General

  • Target

    fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516.zip

  • Size

    11.7MB

  • Sample

    241021-f4xkkasfmk

  • MD5

    8ec7644b9f1cd06aa2d9bd7a3ea77c6c

  • SHA1

    db159b46543b044cb018a75d31e3852883b0ae0e

  • SHA256

    b6c6fb881fb37b9f3b55a0471cb844ad2001ceb8ddd82aebf24074309ccd795d

  • SHA512

    81766dfb9360783d373df8c2e73f148f3e44fa06035033f314da455f2c4c693d1ac0b98374aa5a63df6c9be29260abeb9b3393e922f27f34dd5194f556e273f9

  • SSDEEP

    196608:DsgzutpVodmsy17g2fujIRuDO0baickpbRYzmBx8nV/83GJrs6glYwLADc5Oz+n:OqWh2sRuD1GcpUG6rs6RDc5Oz+n

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

baslayalim

C2

91.92.242.187:1339

Mutex

46f87cb2b7a37b42307390e98359779e

Attributes
  • reg_key

    46f87cb2b7a37b42307390e98359779e

  • splitter

    |'|'|

Targets

    • Target

      fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516

    • Size

      20.7MB

    • MD5

      1c26f1a4ee0ee14a776f10eff0a7f652

    • SHA1

      776be5867732f91bdf587420e87ea3ccea075dc5

    • SHA256

      fbef397f7b9e59defe5c9dda20598ea1e61c50b515c067f16fb353765beb8516

    • SHA512

      5b9675a48ca762262afe062cd46b3d2e996e8d13bd80bb1107b3a33995a217b87ba3ab3a6e82eae3ac36f745ab5f5b5f56e36c01fdf2fd79c6b6f9c52d0eb5a8

    • SSDEEP

      196608:DgRrd4rYBFH179k3qxnWcdoT+u0XRZTdbQguI8gh833xxaMfYky:0FH1yuW/+tdSI8ge3Ly

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks