General

  • Target

    b2adfbc877ac1f38f17483e5d32c9b6c8840868d5cd070e5c8d1d4ca7aa41a0a

  • Size

    23KB

  • Sample

    241102-rj8ymswhkm

  • MD5

    8723ba329d1b40d4eeec747703fa2e1a

  • SHA1

    2aeecbe3704d04845f9767dcf42d164df0a60f87

  • SHA256

    b2adfbc877ac1f38f17483e5d32c9b6c8840868d5cd070e5c8d1d4ca7aa41a0a

  • SHA512

    c5beae5c02bb73ecfed64daa9cd9ab8c1b1be60baabde45e4f0596306ef6d589627fac1b161184f64fa7511be2ca50011756452588bfbdc93e6275a413830c78

  • SSDEEP

    384:3Q+ILgIbOprgPsUOSU0kB1kd6dg7GYh/JomRvR6JZlbw8hqIusZzZHO:qLL6MVU0NRpcnu9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

59da4ba4e355635c767b06d85318b684

Attributes
  • reg_key

    59da4ba4e355635c767b06d85318b684

  • splitter

    |'|'|

Targets

    • Target

      b2adfbc877ac1f38f17483e5d32c9b6c8840868d5cd070e5c8d1d4ca7aa41a0a

    • Size

      23KB

    • MD5

      8723ba329d1b40d4eeec747703fa2e1a

    • SHA1

      2aeecbe3704d04845f9767dcf42d164df0a60f87

    • SHA256

      b2adfbc877ac1f38f17483e5d32c9b6c8840868d5cd070e5c8d1d4ca7aa41a0a

    • SHA512

      c5beae5c02bb73ecfed64daa9cd9ab8c1b1be60baabde45e4f0596306ef6d589627fac1b161184f64fa7511be2ca50011756452588bfbdc93e6275a413830c78

    • SSDEEP

      384:3Q+ILgIbOprgPsUOSU0kB1kd6dg7GYh/JomRvR6JZlbw8hqIusZzZHO:qLL6MVU0NRpcnu9

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks