General

  • Target

    Server22.exe

  • Size

    287KB

  • Sample

    241031-hdjxws1jh1

  • MD5

    8416926446f203e874143dd21d534cbc

  • SHA1

    0669ed6fa64701b149278e93b7060fc86f1e0950

  • SHA256

    701ce077bbe2c27c2496cad43d99ec4c6923c5f56f8d7f286c4e0623a789e79b

  • SHA512

    0c255f090613148761abba312fb9256b9dc7a2cd04c01b2745de88012b2928934e06438c3415f1fec40eb6b8f4354b5dd074bcb3b593018fcf6a55ef2b9affc3

  • SSDEEP

    3072:pcwb0m2QAsSdADRq6ty71wtYM77ldY7AXTp2kA:5uwH77Ppj0kA

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:8888

Mutex

a3bfe23a1eca722fceb292fb6eee1294

Attributes
  • reg_key

    a3bfe23a1eca722fceb292fb6eee1294

  • splitter

    |'|'|

Targets

    • Target

      Server22.exe

    • Size

      287KB

    • MD5

      8416926446f203e874143dd21d534cbc

    • SHA1

      0669ed6fa64701b149278e93b7060fc86f1e0950

    • SHA256

      701ce077bbe2c27c2496cad43d99ec4c6923c5f56f8d7f286c4e0623a789e79b

    • SHA512

      0c255f090613148761abba312fb9256b9dc7a2cd04c01b2745de88012b2928934e06438c3415f1fec40eb6b8f4354b5dd074bcb3b593018fcf6a55ef2b9affc3

    • SSDEEP

      3072:pcwb0m2QAsSdADRq6ty71wtYM77ldY7AXTp2kA:5uwH77Ppj0kA

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks