General

  • Target

    2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N

  • Size

    65KB

  • Sample

    241110-gkeq3s1ckn

  • MD5

    238a30e9eb78a74c018e0b2d602ea140

  • SHA1

    ce425e2e719f1afb84f34e1a3ac6190302c414ba

  • SHA256

    2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32

  • SHA512

    d7faedc9814393945e052e6899f50d3cfda1812cdf499c1ab8fac449a16ae8381a70345f6e49fce421c4103bbf22cf07cf0e35da6876e19fbf23194d34048f7a

  • SSDEEP

    768:jY+sNKqNHnSdRpcnuqhWYu2cbkxLuu0ycN:0+sdV+RWuq

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.10.1:5552

Mutex

9d253092f1a2b023ee6730bd5835421b

Attributes
  • reg_key

    9d253092f1a2b023ee6730bd5835421b

  • splitter

    |'|'|

Targets

    • Target

      2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32N

    • Size

      65KB

    • MD5

      238a30e9eb78a74c018e0b2d602ea140

    • SHA1

      ce425e2e719f1afb84f34e1a3ac6190302c414ba

    • SHA256

      2c43d8a297448b14dacd130cf520c4c2a6626881454660a46b4d88415ae41e32

    • SHA512

      d7faedc9814393945e052e6899f50d3cfda1812cdf499c1ab8fac449a16ae8381a70345f6e49fce421c4103bbf22cf07cf0e35da6876e19fbf23194d34048f7a

    • SSDEEP

      768:jY+sNKqNHnSdRpcnuqhWYu2cbkxLuu0ycN:0+sdV+RWuq

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks