General

  • Target

    35ab7511173a1e1ffe18a4128e40f0ba50fe85e9e8d2995287b697fd4ae027e5N

  • Size

    23KB

  • Sample

    241109-1t6eyatbkh

  • MD5

    63cb4bfb8a75c831ad74e88a3302eb10

  • SHA1

    ae9b155a83f7c41ef762a3b608142a170dba65ac

  • SHA256

    35ab7511173a1e1ffe18a4128e40f0ba50fe85e9e8d2995287b697fd4ae027e5

  • SHA512

    b912b9ac58df5ae6d46d60c594f09a4d9cc3e7f6539dd89123f8bd444f8b58f2ed3e51659c9d8c0ae1b55ba6ec3164adaa48208491074e7314b844708c1b6544

  • SSDEEP

    384:/oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI0:Y7O89p2rRpcnuG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      35ab7511173a1e1ffe18a4128e40f0ba50fe85e9e8d2995287b697fd4ae027e5N

    • Size

      23KB

    • MD5

      63cb4bfb8a75c831ad74e88a3302eb10

    • SHA1

      ae9b155a83f7c41ef762a3b608142a170dba65ac

    • SHA256

      35ab7511173a1e1ffe18a4128e40f0ba50fe85e9e8d2995287b697fd4ae027e5

    • SHA512

      b912b9ac58df5ae6d46d60c594f09a4d9cc3e7f6539dd89123f8bd444f8b58f2ed3e51659c9d8c0ae1b55ba6ec3164adaa48208491074e7314b844708c1b6544

    • SSDEEP

      384:/oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI0:Y7O89p2rRpcnuG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks