General

  • Target

    40707070b08ed22f176b00c8b79e5d4933b1f57f14d2c23025218fc57c0d2fa7N

  • Size

    23KB

  • Sample

    241109-ksrx6a1gmf

  • MD5

    bcf809aee24bc8d84b1613bd9a8dce70

  • SHA1

    263d6290d18d8779295969c5ea4f31fd9d02b62d

  • SHA256

    40707070b08ed22f176b00c8b79e5d4933b1f57f14d2c23025218fc57c0d2fa7

  • SHA512

    75f2b6a52c9885bccafa53d787351254f6b4d9f3257b4afec796774ecb9c17b5107c3415d01d0926e2ec859aa64cc2e29ae650780d4ea42ea16170a75a148db7

  • SSDEEP

    384:0oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIt:j7O89p2rRpcnuz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      40707070b08ed22f176b00c8b79e5d4933b1f57f14d2c23025218fc57c0d2fa7N

    • Size

      23KB

    • MD5

      bcf809aee24bc8d84b1613bd9a8dce70

    • SHA1

      263d6290d18d8779295969c5ea4f31fd9d02b62d

    • SHA256

      40707070b08ed22f176b00c8b79e5d4933b1f57f14d2c23025218fc57c0d2fa7

    • SHA512

      75f2b6a52c9885bccafa53d787351254f6b4d9f3257b4afec796774ecb9c17b5107c3415d01d0926e2ec859aa64cc2e29ae650780d4ea42ea16170a75a148db7

    • SSDEEP

      384:0oWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIt:j7O89p2rRpcnuz

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks