General

  • Target

    Server.exe

  • Size

    287KB

  • Sample

    241031-haztyatnan

  • MD5

    ea17b12f90b9d9f940454651bb23ddb2

  • SHA1

    1f06fc12afcf267d8663bf92e00a09c46b68c849

  • SHA256

    c178a4227f0869c0ec5b0cc1d1ebff42a82a4b3f23e71c2fdccf5673d1f5e287

  • SHA512

    62086639d824584da2c269bc31932efe8660732dcd15f071436e794fb8687e2b89c1551d6439dcb0e5f02213bdbdbf078c4b220b39ac64c79e9c98dbf3f632a9

  • SSDEEP

    3072:Acwb092QAsSdADRq6ty71wtYM77ldY7AXTp2kA:ZuwH77Ppj0kA

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:8888

Mutex

a3bfe23a1eca722fceb292fb6eee1294

Attributes
  • reg_key

    a3bfe23a1eca722fceb292fb6eee1294

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      287KB

    • MD5

      ea17b12f90b9d9f940454651bb23ddb2

    • SHA1

      1f06fc12afcf267d8663bf92e00a09c46b68c849

    • SHA256

      c178a4227f0869c0ec5b0cc1d1ebff42a82a4b3f23e71c2fdccf5673d1f5e287

    • SHA512

      62086639d824584da2c269bc31932efe8660732dcd15f071436e794fb8687e2b89c1551d6439dcb0e5f02213bdbdbf078c4b220b39ac64c79e9c98dbf3f632a9

    • SSDEEP

      3072:Acwb092QAsSdADRq6ty71wtYM77ldY7AXTp2kA:ZuwH77Ppj0kA

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks