General

  • Target

    9eb8c3a875b3ef9d68e9572250d6f1ad72e10caba9a2592962210dc989d5d480

  • Size

    33KB

  • Sample

    241111-x68jaaxpej

  • MD5

    9b5222b2d6f2b8e64410435fb06036e6

  • SHA1

    6be828d954bfa15b4fb027e495758c1ece30293a

  • SHA256

    9eb8c3a875b3ef9d68e9572250d6f1ad72e10caba9a2592962210dc989d5d480

  • SHA512

    a000a7127db0b59f791c80ee5db974e330c832e0ab3bca1c5df58aac403a5463d84ce1859ef2e7c517437192f249473ccea7a24b6c1e36b29bbae7d1ce78894b

  • SSDEEP

    384:qvweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZPtay9HtdI:qQLq411eRpcnuul9N7m

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

bedcgd

C2

198.49.23.145:6523

Mutex

29258b212e8eeca9dee6e8e7af4efd51

Attributes
  • reg_key

    29258b212e8eeca9dee6e8e7af4efd51

  • splitter

    |'|'|

Targets

    • Target

      9eb8c3a875b3ef9d68e9572250d6f1ad72e10caba9a2592962210dc989d5d480

    • Size

      33KB

    • MD5

      9b5222b2d6f2b8e64410435fb06036e6

    • SHA1

      6be828d954bfa15b4fb027e495758c1ece30293a

    • SHA256

      9eb8c3a875b3ef9d68e9572250d6f1ad72e10caba9a2592962210dc989d5d480

    • SHA512

      a000a7127db0b59f791c80ee5db974e330c832e0ab3bca1c5df58aac403a5463d84ce1859ef2e7c517437192f249473ccea7a24b6c1e36b29bbae7d1ce78894b

    • SSDEEP

      384:qvweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZPtay9HtdI:qQLq411eRpcnuul9N7m

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks