General

  • Target

    1ef5eda9c6b16e272c67b76ff44a76fda8cb6ab18058fc81ebb5bb5440af7850

  • Size

    23KB

  • Sample

    241028-zlj2asxbqd

  • MD5

    01a63bd3805aa0def9d903784072b386

  • SHA1

    0bbb04ec5a764512e1a042826fbaacfe03ade9ff

  • SHA256

    1ef5eda9c6b16e272c67b76ff44a76fda8cb6ab18058fc81ebb5bb5440af7850

  • SHA512

    f00e169a6a7b60848c99e694275fdb330d031f51c8049238f487629c51063d86ab8afa4378d8e0ca7d4f03865214782bb1073620a966046d1f204bd31fcd7988

  • SSDEEP

    384:7oWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZID:U7O89pbrRpcnu5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      1ef5eda9c6b16e272c67b76ff44a76fda8cb6ab18058fc81ebb5bb5440af7850

    • Size

      23KB

    • MD5

      01a63bd3805aa0def9d903784072b386

    • SHA1

      0bbb04ec5a764512e1a042826fbaacfe03ade9ff

    • SHA256

      1ef5eda9c6b16e272c67b76ff44a76fda8cb6ab18058fc81ebb5bb5440af7850

    • SHA512

      f00e169a6a7b60848c99e694275fdb330d031f51c8049238f487629c51063d86ab8afa4378d8e0ca7d4f03865214782bb1073620a966046d1f204bd31fcd7988

    • SSDEEP

      384:7oWtkEwn65rgjAsGipk58D16xgXakhbZD0mRvR6JZlbw8hqIusZzZID:U7O89pbrRpcnu5

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks