General

  • Target

    d955597ce66b897bd7032251713eb37170d4624b39be2cdec449a1e0ba160c79N

  • Size

    863KB

  • Sample

    241029-el1ntssmgx

  • MD5

    2211ba76a857777e0fb398f4a7dcb660

  • SHA1

    7c4a5e49331eec455d7040c619543f95d5fc8ec1

  • SHA256

    d955597ce66b897bd7032251713eb37170d4624b39be2cdec449a1e0ba160c79

  • SHA512

    6cc3601c96c941dd3429edb3d03ad71d23856979cf72ec5e4cdef69c495536c3b66decc8e46c42dbc2a54b19e3e963efc5613e1216a297e883dbc7b9930bb287

  • SSDEEP

    24576:e4lavt0LkLL9IMixoEgeasclqkq9MmCS:Jkwkn9IMHeasEPaPCS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      d955597ce66b897bd7032251713eb37170d4624b39be2cdec449a1e0ba160c79N

    • Size

      863KB

    • MD5

      2211ba76a857777e0fb398f4a7dcb660

    • SHA1

      7c4a5e49331eec455d7040c619543f95d5fc8ec1

    • SHA256

      d955597ce66b897bd7032251713eb37170d4624b39be2cdec449a1e0ba160c79

    • SHA512

      6cc3601c96c941dd3429edb3d03ad71d23856979cf72ec5e4cdef69c495536c3b66decc8e46c42dbc2a54b19e3e963efc5613e1216a297e883dbc7b9930bb287

    • SSDEEP

      24576:e4lavt0LkLL9IMixoEgeasclqkq9MmCS:Jkwkn9IMHeasEPaPCS

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks