General

  • Target

    4a69898c4d1a747dcc91d35f11ddfdf6d743d1df0167dfa75ad27f385d38d62cN

  • Size

    23KB

  • Sample

    241104-y7y7nsxbpm

  • MD5

    0ab49d41abd120b223162c88edcd16c0

  • SHA1

    6960372e2605b3f38ece2497bbb9aa09a17cdb3b

  • SHA256

    4a69898c4d1a747dcc91d35f11ddfdf6d743d1df0167dfa75ad27f385d38d62c

  • SHA512

    f21ca14a434e3ff974cfb1b21daf6544593f8c8f37518b0a4952ce655f1fc72aa3a5512c5dd3cbb1d0bfb2260e7c858ad7500a2e6383d6c7c117250228841665

  • SSDEEP

    384:WoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIe:J7O89p2rRpcnuk

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      4a69898c4d1a747dcc91d35f11ddfdf6d743d1df0167dfa75ad27f385d38d62cN

    • Size

      23KB

    • MD5

      0ab49d41abd120b223162c88edcd16c0

    • SHA1

      6960372e2605b3f38ece2497bbb9aa09a17cdb3b

    • SHA256

      4a69898c4d1a747dcc91d35f11ddfdf6d743d1df0167dfa75ad27f385d38d62c

    • SHA512

      f21ca14a434e3ff974cfb1b21daf6544593f8c8f37518b0a4952ce655f1fc72aa3a5512c5dd3cbb1d0bfb2260e7c858ad7500a2e6383d6c7c117250228841665

    • SSDEEP

      384:WoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIe:J7O89p2rRpcnuk

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks