General

  • Target

    9b39db2bbf6b71edae4d8410792a1067fb2bb4fa19a2571a716e6ce03fa2eb37.exe

  • Size

    156KB

  • Sample

    241122-2jmqhsxkgl

  • MD5

    a0f88bc237eddf287d6a555cd55550f6

  • SHA1

    484c57cd8fdb6a099dce818a362bd856e1dcefcb

  • SHA256

    9b39db2bbf6b71edae4d8410792a1067fb2bb4fa19a2571a716e6ce03fa2eb37

  • SHA512

    ff8fb1c5003e263b8fb600ba4b837de090c939d0de2a1d1bef982841155708ab430ac90a184b12c84a5ca325493da0d168080b141cc9a759e0ce87fc1fad4826

  • SSDEEP

    3072:XCtB0x06xmjs7e2QTeJ6VF+Ycp4wEkkD3rc4naoAkNFM3odi0GAL:Sjd

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Vitima

C2

downhacking.duckdns.org:1177

Mutex

0d39e4190d68272f174cf71722404520

Attributes
  • reg_key

    0d39e4190d68272f174cf71722404520

  • splitter

    |'|'|

Targets

    • Target

      9b39db2bbf6b71edae4d8410792a1067fb2bb4fa19a2571a716e6ce03fa2eb37.exe

    • Size

      156KB

    • MD5

      a0f88bc237eddf287d6a555cd55550f6

    • SHA1

      484c57cd8fdb6a099dce818a362bd856e1dcefcb

    • SHA256

      9b39db2bbf6b71edae4d8410792a1067fb2bb4fa19a2571a716e6ce03fa2eb37

    • SHA512

      ff8fb1c5003e263b8fb600ba4b837de090c939d0de2a1d1bef982841155708ab430ac90a184b12c84a5ca325493da0d168080b141cc9a759e0ce87fc1fad4826

    • SSDEEP

      3072:XCtB0x06xmjs7e2QTeJ6VF+Ycp4wEkkD3rc4naoAkNFM3odi0GAL:Sjd

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks