General

  • Target

    e925e0255230d3acffda666b387a3d65da885b792c4d1d71d92fe9ea2127c3d8N

  • Size

    23KB

  • Sample

    241101-3vf8jsxcpq

  • MD5

    f44131ee5e3bfd345e3304402d8fa580

  • SHA1

    c82a4b3946fc85944e7e00f53130af80bfdfd17a

  • SHA256

    e925e0255230d3acffda666b387a3d65da885b792c4d1d71d92fe9ea2127c3d8

  • SHA512

    7b76bd361451d7e409f031e6f9f2495cd1a5822376d1a37cdcc968e13b764a018702a556ff3acc920b20a4a6768d0d244233e864bbeb8f360d3d5e4a928eab76

  • SSDEEP

    384:LnoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI1:s7O89p2rRpcnuH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      e925e0255230d3acffda666b387a3d65da885b792c4d1d71d92fe9ea2127c3d8N

    • Size

      23KB

    • MD5

      f44131ee5e3bfd345e3304402d8fa580

    • SHA1

      c82a4b3946fc85944e7e00f53130af80bfdfd17a

    • SHA256

      e925e0255230d3acffda666b387a3d65da885b792c4d1d71d92fe9ea2127c3d8

    • SHA512

      7b76bd361451d7e409f031e6f9f2495cd1a5822376d1a37cdcc968e13b764a018702a556ff3acc920b20a4a6768d0d244233e864bbeb8f360d3d5e4a928eab76

    • SSDEEP

      384:LnoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI1:s7O89p2rRpcnuH

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks