General

  • Target

    8ccdea6c2ee48036d6edd9d79887b3d7e13a0291d1bdddc305a141d0596e3a22.exe

  • Size

    570KB

  • Sample

    241118-m74avavepc

  • MD5

    6eefc2e66427352eb73e4d25633aebdc

  • SHA1

    b8452552ca2ac65d844649f295a4fe6ce494577e

  • SHA256

    8ccdea6c2ee48036d6edd9d79887b3d7e13a0291d1bdddc305a141d0596e3a22

  • SHA512

    62586d8a2c623c6676598c7f4c8e4c1da96ddf5af1e6395bcf52d7ed752da4b17bb6e1279f4bd91c53401b436bc561f7727aebc7d772cb7988dd7ad340d81e53

  • SSDEEP

    12288:LF6kN+Db1Sk42sC5kQRP31W/su/HFQXmB9T9dnB:LF6kcnUkdrWHFQWB9T9NB

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

ameerof.no-ip.org:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      8ccdea6c2ee48036d6edd9d79887b3d7e13a0291d1bdddc305a141d0596e3a22.exe

    • Size

      570KB

    • MD5

      6eefc2e66427352eb73e4d25633aebdc

    • SHA1

      b8452552ca2ac65d844649f295a4fe6ce494577e

    • SHA256

      8ccdea6c2ee48036d6edd9d79887b3d7e13a0291d1bdddc305a141d0596e3a22

    • SHA512

      62586d8a2c623c6676598c7f4c8e4c1da96ddf5af1e6395bcf52d7ed752da4b17bb6e1279f4bd91c53401b436bc561f7727aebc7d772cb7988dd7ad340d81e53

    • SSDEEP

      12288:LF6kN+Db1Sk42sC5kQRP31W/su/HFQXmB9T9dnB:LF6kcnUkdrWHFQWB9T9NB

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks