General

  • Target

    6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387N

  • Size

    37KB

  • Sample

    241022-h4tvsawamq

  • MD5

    2ab5d8c77b69c83b4586327b4e5b1ac0

  • SHA1

    4bb9f0235b34646e144a737b4411bf8b9b54fa84

  • SHA256

    6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387

  • SHA512

    370895216cf89f160fb7b8a8413b820a91b6bad1b4073648418f31ed39a3d55476564bf0809ac28cc7e041eaf1fbe7a08b1a28aafd2dd8624e1c638013ade608

  • SSDEEP

    384:EuOIiu/jtD+P3V+y0bFwRktv7ms2cPPrAF+rMRTyN/0L+EcoinblneHQM3epzXeG:xXmV10bFwRktalc3rM+rMRa8NuQ5st

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

530243754b22224b529f98e07e5b54cd

Attributes
  • reg_key

    530243754b22224b529f98e07e5b54cd

  • splitter

    |'|'|

Targets

    • Target

      6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387N

    • Size

      37KB

    • MD5

      2ab5d8c77b69c83b4586327b4e5b1ac0

    • SHA1

      4bb9f0235b34646e144a737b4411bf8b9b54fa84

    • SHA256

      6e6d4fc9df4cbbe2aa3891448cd2bb7dd5f0bfb4396f6c76ed794292cebac387

    • SHA512

      370895216cf89f160fb7b8a8413b820a91b6bad1b4073648418f31ed39a3d55476564bf0809ac28cc7e041eaf1fbe7a08b1a28aafd2dd8624e1c638013ade608

    • SSDEEP

      384:EuOIiu/jtD+P3V+y0bFwRktv7ms2cPPrAF+rMRTyN/0L+EcoinblneHQM3epzXeG:xXmV10bFwRktalc3rM+rMRa8NuQ5st

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks