General

  • Target

    9bbc44253bb0da8ffb93efa7666097934ce3aa8f145d4985a7793b6ee284633aN

  • Size

    23KB

  • Sample

    241109-g6kjfsslej

  • MD5

    8a65396bf12047be09c5c7e900419480

  • SHA1

    f766f115e39c13089a9a81bb5992aa14bec5c080

  • SHA256

    9bbc44253bb0da8ffb93efa7666097934ce3aa8f145d4985a7793b6ee284633a

  • SHA512

    0b6a5907f58e01f28a34de7749cce01e6fa162903073ba69cd6fa20fc69ccd6c2f7d0404d9476ad30bba41a8906ace30de92563821561dd4907ea44ae43472ec

  • SSDEEP

    384:KoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIe:t7O89p2rRpcnuM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      9bbc44253bb0da8ffb93efa7666097934ce3aa8f145d4985a7793b6ee284633aN

    • Size

      23KB

    • MD5

      8a65396bf12047be09c5c7e900419480

    • SHA1

      f766f115e39c13089a9a81bb5992aa14bec5c080

    • SHA256

      9bbc44253bb0da8ffb93efa7666097934ce3aa8f145d4985a7793b6ee284633a

    • SHA512

      0b6a5907f58e01f28a34de7749cce01e6fa162903073ba69cd6fa20fc69ccd6c2f7d0404d9476ad30bba41a8906ace30de92563821561dd4907ea44ae43472ec

    • SSDEEP

      384:KoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIe:t7O89p2rRpcnuM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks