General

  • Target

    db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe

  • Size

    93KB

  • Sample

    241122-s88vlstnaz

  • MD5

    d61320e11b78f4c54887b55d238ad600

  • SHA1

    c11c3eb0b94909897081e0d5bb8bc1656376afd1

  • SHA256

    db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03

  • SHA512

    a1b20825856517613ebc99b4b1d80b34c05e26c8cba8db6a0707cc08329e05af6243e1b4ec1511e46c1fae8b595d78d2c7ed698fb5ec6ec303b54e35a24badf4

  • SSDEEP

    1536:s4UpR8lZc+/2HK1j+fTd5jEwzGi1dDWD5gS:s4UpKc+/2HK1oTdWi1dQ2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

78.156.229.8:7777

Mutex

31a76954e6446acb903929bf0d0d71d9

Attributes
  • reg_key

    31a76954e6446acb903929bf0d0d71d9

  • splitter

    |'|'|

Targets

    • Target

      db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03N.exe

    • Size

      93KB

    • MD5

      d61320e11b78f4c54887b55d238ad600

    • SHA1

      c11c3eb0b94909897081e0d5bb8bc1656376afd1

    • SHA256

      db7eaa14e273a45a95c0c5e3404ee9ef2b8488d35e0cefd3440f94c441ed4e03

    • SHA512

      a1b20825856517613ebc99b4b1d80b34c05e26c8cba8db6a0707cc08329e05af6243e1b4ec1511e46c1fae8b595d78d2c7ed698fb5ec6ec303b54e35a24badf4

    • SSDEEP

      1536:s4UpR8lZc+/2HK1j+fTd5jEwzGi1dDWD5gS:s4UpKc+/2HK1oTdWi1dQ2

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks