General

  • Target

    a904e933f2c99838633aa43bbdda3b260be7d9a5ae3bc419cdf62acee8429a8eN

  • Size

    23KB

  • Sample

    241104-v7bjtstkcz

  • MD5

    7b9a65228b56ac8de52b81c782d8ede0

  • SHA1

    44439199c37e64fb2ca280d4522f72247aa654d9

  • SHA256

    a904e933f2c99838633aa43bbdda3b260be7d9a5ae3bc419cdf62acee8429a8e

  • SHA512

    7e0d9b3e051a7dc262303015c15575f5b4f128aea19614b524ff96799d9f878f7003f9f955fa34bcda488f60c49dab5f3e2255f3d467504b558cf004cb1d96ad

  • SSDEEP

    384:aoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIld:97O89p2rRpcnujd

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      a904e933f2c99838633aa43bbdda3b260be7d9a5ae3bc419cdf62acee8429a8eN

    • Size

      23KB

    • MD5

      7b9a65228b56ac8de52b81c782d8ede0

    • SHA1

      44439199c37e64fb2ca280d4522f72247aa654d9

    • SHA256

      a904e933f2c99838633aa43bbdda3b260be7d9a5ae3bc419cdf62acee8429a8e

    • SHA512

      7e0d9b3e051a7dc262303015c15575f5b4f128aea19614b524ff96799d9f878f7003f9f955fa34bcda488f60c49dab5f3e2255f3d467504b558cf004cb1d96ad

    • SSDEEP

      384:aoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIld:97O89p2rRpcnujd

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks