General

  • Target

    0c9277cd6937ff956d8499b27a04ff59fb53bfca4223dfd309f6e5a58a6e56a4N

  • Size

    1.9MB

  • Sample

    241025-ztfzlsvcld

  • MD5

    920a4b746aa220e9febc5f657de8bb70

  • SHA1

    74c1a2cf70479ef51f057394a6a8437be4076b17

  • SHA256

    0c9277cd6937ff956d8499b27a04ff59fb53bfca4223dfd309f6e5a58a6e56a4

  • SHA512

    43360700c93f3d45e279cf27e7d2ea8d59afb9f574e4a684b13b32fb9f0d3f17f71ce74b234e8560f0b3d41c046d613851ee98f58f41d55d409a6ca872240030

  • SSDEEP

    49152:nKo/q54iLkcvUZskJIbp2FXWw0mMFL2Oy6e:no5LIsTgFV0mgA

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

teste

C2

types-menu.gl.at.ply.gg:13858

Mutex

2283af8f0e1beb0fbd70894c374bcd40

Attributes
  • reg_key

    2283af8f0e1beb0fbd70894c374bcd40

  • splitter

    |'|'|

Targets

    • Target

      0c9277cd6937ff956d8499b27a04ff59fb53bfca4223dfd309f6e5a58a6e56a4N

    • Size

      1.9MB

    • MD5

      920a4b746aa220e9febc5f657de8bb70

    • SHA1

      74c1a2cf70479ef51f057394a6a8437be4076b17

    • SHA256

      0c9277cd6937ff956d8499b27a04ff59fb53bfca4223dfd309f6e5a58a6e56a4

    • SHA512

      43360700c93f3d45e279cf27e7d2ea8d59afb9f574e4a684b13b32fb9f0d3f17f71ce74b234e8560f0b3d41c046d613851ee98f58f41d55d409a6ca872240030

    • SSDEEP

      49152:nKo/q54iLkcvUZskJIbp2FXWw0mMFL2Oy6e:no5LIsTgFV0mgA

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks