General

  • Target

    fc2ca4afc70626124f35d0e4251185adf53c224d9fd49b90c16ca00613fe2541

  • Size

    31KB

  • Sample

    241109-gcz22sxrez

  • MD5

    228910f2d8f90acad48eb9a4c213b69c

  • SHA1

    60553d3782d3f23358ecad34fefb7b275726a99c

  • SHA256

    fc2ca4afc70626124f35d0e4251185adf53c224d9fd49b90c16ca00613fe2541

  • SHA512

    24c45e184ef7a325404d3cbba8f57461a64b75bf1d305651e4ff399518c38dedf8d2107cdad5b0d2e2506c52bed1cb981ed950b848a03e22c647e07aeff98123

  • SSDEEP

    768:7XeZyeOHxtgzxbSHXqrgf9dBvisoQmIDUu0tihGj:2Kauf/voQVkZj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

10.0.2.15:5552

Mutex

bd996c26f70b64f1b499d2e4beb71ac3

Attributes
  • reg_key

    bd996c26f70b64f1b499d2e4beb71ac3

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      fc2ca4afc70626124f35d0e4251185adf53c224d9fd49b90c16ca00613fe2541

    • Size

      31KB

    • MD5

      228910f2d8f90acad48eb9a4c213b69c

    • SHA1

      60553d3782d3f23358ecad34fefb7b275726a99c

    • SHA256

      fc2ca4afc70626124f35d0e4251185adf53c224d9fd49b90c16ca00613fe2541

    • SHA512

      24c45e184ef7a325404d3cbba8f57461a64b75bf1d305651e4ff399518c38dedf8d2107cdad5b0d2e2506c52bed1cb981ed950b848a03e22c647e07aeff98123

    • SSDEEP

      768:7XeZyeOHxtgzxbSHXqrgf9dBvisoQmIDUu0tihGj:2Kauf/voQVkZj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks