Resubmissions

General

  • Target

    4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6fN

  • Size

    23KB

  • Sample

    241026-mkl32s1mdy

  • MD5

    c6709a915c0a385a6c10eae5dbce2cc0

  • SHA1

    0ddd4094a4901c977fdf9dd2d6362e515fe79146

  • SHA256

    4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6f

  • SHA512

    7bf847e034e36c96a75fbf490cb2fb25702d80230c46d6f6a4efa1ce7502673a3de84a4a9801096bdc026fb4ce18486d03e70232fbc1d14fa294815f4280f4be

  • SSDEEP

    384:IoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI3:37O89p2rRpcnuZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6fN

    • Size

      23KB

    • MD5

      c6709a915c0a385a6c10eae5dbce2cc0

    • SHA1

      0ddd4094a4901c977fdf9dd2d6362e515fe79146

    • SHA256

      4309c147d9b34dbf0853e020c164902d514f92f770c362dfa3c044802fae8e6f

    • SHA512

      7bf847e034e36c96a75fbf490cb2fb25702d80230c46d6f6a4efa1ce7502673a3de84a4a9801096bdc026fb4ce18486d03e70232fbc1d14fa294815f4280f4be

    • SSDEEP

      384:IoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI3:37O89p2rRpcnuZ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks