General

  • Target

    2a61cdee5f9d7dd4930aef9774a9bb909fb15e3c62f5dcad5d7c9843ffc4c3b1N

  • Size

    531KB

  • Sample

    241109-vl25naxmfw

  • MD5

    5672033192553965f397e00cc5ed2b90

  • SHA1

    4238c1c5240ad9332e58c4bca9305cb3ae57c9eb

  • SHA256

    2a61cdee5f9d7dd4930aef9774a9bb909fb15e3c62f5dcad5d7c9843ffc4c3b1

  • SHA512

    ef743cbf8060a11748a430b618165ab7885b4d3ff6aca51b50d59ac3ab3a2ec2cc9ad11befd217c76c3124e1d89320e215acc1a42fbc0b838840638b982a284e

  • SSDEEP

    12288:quhrOarWLTR2viEmOG6LZgE5T/j85ZGyOcqz5:qx2HzG6lTb8WyOck5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

BEKA

C2

ronymahmoud.casacam.net:1177

Mutex

32bad0fc686dd5769ff8860131056010

Attributes
  • reg_key

    32bad0fc686dd5769ff8860131056010

  • splitter

    |'|'|

Targets

    • Target

      2a61cdee5f9d7dd4930aef9774a9bb909fb15e3c62f5dcad5d7c9843ffc4c3b1N

    • Size

      531KB

    • MD5

      5672033192553965f397e00cc5ed2b90

    • SHA1

      4238c1c5240ad9332e58c4bca9305cb3ae57c9eb

    • SHA256

      2a61cdee5f9d7dd4930aef9774a9bb909fb15e3c62f5dcad5d7c9843ffc4c3b1

    • SHA512

      ef743cbf8060a11748a430b618165ab7885b4d3ff6aca51b50d59ac3ab3a2ec2cc9ad11befd217c76c3124e1d89320e215acc1a42fbc0b838840638b982a284e

    • SSDEEP

      12288:quhrOarWLTR2viEmOG6LZgE5T/j85ZGyOcqz5:qx2HzG6lTb8WyOck5

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks