General

  • Target

    834124ffbe093719c4db0673a586fc1223baab8a45bc30112e00156243f5c72aN

  • Size

    23KB

  • Sample

    241102-1argnswcqg

  • MD5

    5d67b6be356f24350504eff9211a6720

  • SHA1

    d222045591c9626151d42c34c1587d736c51c934

  • SHA256

    834124ffbe093719c4db0673a586fc1223baab8a45bc30112e00156243f5c72a

  • SHA512

    784fa8337100edff0778ea152f311cf6e875c4da26a402528b161a40330c02ec01b5e028931fd8b8fe187920add3a00659d806a25b7e89e99de26b25db9338cb

  • SSDEEP

    384:UslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZWs:deEvwIlLMRpcnuY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.5:5552

Mutex

54c3bd7fd81a24dad0a87512e97f2c1f

Attributes
  • reg_key

    54c3bd7fd81a24dad0a87512e97f2c1f

  • splitter

    |'|'|

Targets

    • Target

      834124ffbe093719c4db0673a586fc1223baab8a45bc30112e00156243f5c72aN

    • Size

      23KB

    • MD5

      5d67b6be356f24350504eff9211a6720

    • SHA1

      d222045591c9626151d42c34c1587d736c51c934

    • SHA256

      834124ffbe093719c4db0673a586fc1223baab8a45bc30112e00156243f5c72a

    • SHA512

      784fa8337100edff0778ea152f311cf6e875c4da26a402528b161a40330c02ec01b5e028931fd8b8fe187920add3a00659d806a25b7e89e99de26b25db9338cb

    • SSDEEP

      384:UslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZWs:deEvwIlLMRpcnuY

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks