General

  • Target

    52c8a1e29d505d26eead9a4d8164aa45f445c6db20672d7cfc36a21a2ff4234eN

  • Size

    23KB

  • Sample

    241109-crk48axpel

  • MD5

    fff135266da36c732fadabe4050924d0

  • SHA1

    474e05190a77304be737917d9184f27c2f607dab

  • SHA256

    52c8a1e29d505d26eead9a4d8164aa45f445c6db20672d7cfc36a21a2ff4234e

  • SHA512

    2cb148daa402625b544b1eba3e7a007a2b1d8e1562dc8afca7743f7de915580562ba6b57fdc499fe541f56ad43f95d1cb499e2dd48f9ef6cb1cd8c475bb43e40

  • SSDEEP

    384:CcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZtQ:V30py6vhxaRpcnuZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.6.133:5552

Mutex

a2152bc9706d0d48dc8d279bccc73c8c

Attributes
  • reg_key

    a2152bc9706d0d48dc8d279bccc73c8c

  • splitter

    |'|'|

Targets

    • Target

      52c8a1e29d505d26eead9a4d8164aa45f445c6db20672d7cfc36a21a2ff4234eN

    • Size

      23KB

    • MD5

      fff135266da36c732fadabe4050924d0

    • SHA1

      474e05190a77304be737917d9184f27c2f607dab

    • SHA256

      52c8a1e29d505d26eead9a4d8164aa45f445c6db20672d7cfc36a21a2ff4234e

    • SHA512

      2cb148daa402625b544b1eba3e7a007a2b1d8e1562dc8afca7743f7de915580562ba6b57fdc499fe541f56ad43f95d1cb499e2dd48f9ef6cb1cd8c475bb43e40

    • SSDEEP

      384:CcqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZtQ:V30py6vhxaRpcnuZ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks