General

  • Target

    233bd0ca5f6dedbe4606401ff601a9cb6d8c0619d0b5908d7a8ffb884bdca012

  • Size

    863KB

  • Sample

    241123-y8371svlgs

  • MD5

    5d7efa57ada9b5d5ec838d12a3dccaa3

  • SHA1

    a8916d560fb55d769c5cefa3277566bfbc4451bd

  • SHA256

    233bd0ca5f6dedbe4606401ff601a9cb6d8c0619d0b5908d7a8ffb884bdca012

  • SHA512

    8f8ce22c16714945bc110fa4d45233d625310fa8cad38de723b3c739f44637a7132b4048c6e65b3efeb87a9f98df16468013b38524d36c8c292a29ef60f0c0ea

  • SSDEEP

    12288:M4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgau70yYrq9MmCS:M4lavt0LkLL9IMixoEgea+1Yrq9MmCS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      233bd0ca5f6dedbe4606401ff601a9cb6d8c0619d0b5908d7a8ffb884bdca012

    • Size

      863KB

    • MD5

      5d7efa57ada9b5d5ec838d12a3dccaa3

    • SHA1

      a8916d560fb55d769c5cefa3277566bfbc4451bd

    • SHA256

      233bd0ca5f6dedbe4606401ff601a9cb6d8c0619d0b5908d7a8ffb884bdca012

    • SHA512

      8f8ce22c16714945bc110fa4d45233d625310fa8cad38de723b3c739f44637a7132b4048c6e65b3efeb87a9f98df16468013b38524d36c8c292a29ef60f0c0ea

    • SSDEEP

      12288:M4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgau70yYrq9MmCS:M4lavt0LkLL9IMixoEgea+1Yrq9MmCS

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks