General

  • Target

    e2e53f578f8c9010f6143c77853f1f56891ca7b24054229a505ef2023f17b3caN

  • Size

    23KB

  • Sample

    241107-nfs68s1gjq

  • MD5

    f7ec84243a7953d564c41befb8ba38f0

  • SHA1

    0bf331de5438d673ecc74ce6ad69d71925d99cc9

  • SHA256

    e2e53f578f8c9010f6143c77853f1f56891ca7b24054229a505ef2023f17b3ca

  • SHA512

    3e36a6bd70c6b4d134c7022e50a0137b0a54b0a098f42e584af97bf9fe204523f2bf255e6592fcfcc392009b5ad14d6eac07c71471b98a7edf37b1467421ff94

  • SSDEEP

    384:ioWtkEwn65rgjAsGipk55D16HgXakhbZD0mRvR6JZlbw8hqIusZzZIr:l7O89pErRpcnup

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      e2e53f578f8c9010f6143c77853f1f56891ca7b24054229a505ef2023f17b3caN

    • Size

      23KB

    • MD5

      f7ec84243a7953d564c41befb8ba38f0

    • SHA1

      0bf331de5438d673ecc74ce6ad69d71925d99cc9

    • SHA256

      e2e53f578f8c9010f6143c77853f1f56891ca7b24054229a505ef2023f17b3ca

    • SHA512

      3e36a6bd70c6b4d134c7022e50a0137b0a54b0a098f42e584af97bf9fe204523f2bf255e6592fcfcc392009b5ad14d6eac07c71471b98a7edf37b1467421ff94

    • SSDEEP

      384:ioWtkEwn65rgjAsGipk55D16HgXakhbZD0mRvR6JZlbw8hqIusZzZIr:l7O89pErRpcnup

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks