General

  • Target

    527b60425a9940022ff0c9a446927b6c9dee71749213ed19ecd97b668e967d6eN

  • Size

    23KB

  • Sample

    241109-xy8jbazkcy

  • MD5

    08d49959d736c76656d9e90b8fb788e0

  • SHA1

    d4df1f27b9276d43f2ea98f888120cdd766d1b03

  • SHA256

    527b60425a9940022ff0c9a446927b6c9dee71749213ed19ecd97b668e967d6e

  • SHA512

    23ca456b18d840bf2d5ad64fc55fcf14f74eaf2c5bcfba3788d2d20c3f6eaba16f471f423719cdefe4b059661d234d133277f3eaf7e4e692e281209344cfa359

  • SSDEEP

    384:nY324bcgPiJLQrfARGSRUJsbY6vgvSMBD3t8mRvR6JZlbw8hqIusZzZB5kFy:wL2s+tRARpcnu/U

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.19.133:5552

Mutex

ebec477e4946c68d62200c31c3c088a1

Attributes
  • reg_key

    ebec477e4946c68d62200c31c3c088a1

  • splitter

    |'|'|

Targets

    • Target

      527b60425a9940022ff0c9a446927b6c9dee71749213ed19ecd97b668e967d6eN

    • Size

      23KB

    • MD5

      08d49959d736c76656d9e90b8fb788e0

    • SHA1

      d4df1f27b9276d43f2ea98f888120cdd766d1b03

    • SHA256

      527b60425a9940022ff0c9a446927b6c9dee71749213ed19ecd97b668e967d6e

    • SHA512

      23ca456b18d840bf2d5ad64fc55fcf14f74eaf2c5bcfba3788d2d20c3f6eaba16f471f423719cdefe4b059661d234d133277f3eaf7e4e692e281209344cfa359

    • SSDEEP

      384:nY324bcgPiJLQrfARGSRUJsbY6vgvSMBD3t8mRvR6JZlbw8hqIusZzZB5kFy:wL2s+tRARpcnu/U

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks