General

  • Target

    f7a14218e8d6977abbe5d8d24ee81e7e7794f6316dd012306619e674c16ac915N

  • Size

    23KB

  • Sample

    241022-mxcp5starl

  • MD5

    c03606a65fdbeac1536ab0da6f9f4ca0

  • SHA1

    dc332fd43cbade4e98ca11bb63207a9a9497fa0a

  • SHA256

    f7a14218e8d6977abbe5d8d24ee81e7e7794f6316dd012306619e674c16ac915

  • SHA512

    c093a4d411774af13f7bba4d55e0c93d66927e80b0baa3ae0dc8a60ff684afeae38af4b927e311dbc40403d0b81ada25a9070f8dba82ce72432b665d06147ae8

  • SSDEEP

    384:bsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZav:wf65K2Yf1jKRpcnu3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

monstro333.ddns.net:1177

Mutex

d0b7bb68b81ec1f4e3f4f774532c9d90

Attributes
  • reg_key

    d0b7bb68b81ec1f4e3f4f774532c9d90

  • splitter

    |'|'|

Targets

    • Target

      f7a14218e8d6977abbe5d8d24ee81e7e7794f6316dd012306619e674c16ac915N

    • Size

      23KB

    • MD5

      c03606a65fdbeac1536ab0da6f9f4ca0

    • SHA1

      dc332fd43cbade4e98ca11bb63207a9a9497fa0a

    • SHA256

      f7a14218e8d6977abbe5d8d24ee81e7e7794f6316dd012306619e674c16ac915

    • SHA512

      c093a4d411774af13f7bba4d55e0c93d66927e80b0baa3ae0dc8a60ff684afeae38af4b927e311dbc40403d0b81ada25a9070f8dba82ce72432b665d06147ae8

    • SSDEEP

      384:bsqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZav:wf65K2Yf1jKRpcnu3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks