General

  • Target

    25c89c5c8c5c56fd1a5320cf172be911738b4b1387c9900a6046c3549f6dda24N

  • Size

    23KB

  • Sample

    241107-fmfwgswcrf

  • MD5

    004c62b10973764a42726abfb4bb9d50

  • SHA1

    eaff5879ce0012a6e0468c30dee2cc5a2a7fc909

  • SHA256

    25c89c5c8c5c56fd1a5320cf172be911738b4b1387c9900a6046c3549f6dda24

  • SHA512

    af7e6b9225068792b7b1ac5e8afcd8e5dacc3450fa6bd1d27214b9d07315bd5c75ff8d63c753e07525081be02c520a0bed91df7454acc3c65a428077ebdeb270

  • SSDEEP

    384:1oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIS:67O89p2rRpcnuI

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      25c89c5c8c5c56fd1a5320cf172be911738b4b1387c9900a6046c3549f6dda24N

    • Size

      23KB

    • MD5

      004c62b10973764a42726abfb4bb9d50

    • SHA1

      eaff5879ce0012a6e0468c30dee2cc5a2a7fc909

    • SHA256

      25c89c5c8c5c56fd1a5320cf172be911738b4b1387c9900a6046c3549f6dda24

    • SHA512

      af7e6b9225068792b7b1ac5e8afcd8e5dacc3450fa6bd1d27214b9d07315bd5c75ff8d63c753e07525081be02c520a0bed91df7454acc3c65a428077ebdeb270

    • SSDEEP

      384:1oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIS:67O89p2rRpcnuI

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks