General

  • Target

    9edeb235fdc0a3db864233f7985350817f4b102099b43b30f37640f896571dbc.exe

  • Size

    275KB

  • Sample

    241124-azr7dsvmgv

  • MD5

    cbc4535477a931d3d938d7cface5a653

  • SHA1

    7ef1d86149285c3a7c09405e71ca4df1686508fe

  • SHA256

    9edeb235fdc0a3db864233f7985350817f4b102099b43b30f37640f896571dbc

  • SHA512

    8f7aff6abfbcda738fbfb34157b31730d2cea069a03ecfba1e275f6b99ee90adfa7e416e018b9378387e358b3e47001c8c503ac81c454368a9c4590f81b0d62c

  • SSDEEP

    3072:FghID3ikQ3zhVaAaPxBwOPgJGpFqriFzdFhKHjxQOA8Lvx7lS1BY+yTZoJJHv8X:sFl9JGKiJEDWd8LxUMbZoJJPM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Sveikas Atvykes I stebuklu Saly:)

C2

droidnuuuu.chickenkiller.com:4567

Mutex

0cf1c1ec350102a29be22c9c82437818

Attributes
  • reg_key

    0cf1c1ec350102a29be22c9c82437818

  • splitter

    |'|'|

Targets

    • Target

      9edeb235fdc0a3db864233f7985350817f4b102099b43b30f37640f896571dbc.exe

    • Size

      275KB

    • MD5

      cbc4535477a931d3d938d7cface5a653

    • SHA1

      7ef1d86149285c3a7c09405e71ca4df1686508fe

    • SHA256

      9edeb235fdc0a3db864233f7985350817f4b102099b43b30f37640f896571dbc

    • SHA512

      8f7aff6abfbcda738fbfb34157b31730d2cea069a03ecfba1e275f6b99ee90adfa7e416e018b9378387e358b3e47001c8c503ac81c454368a9c4590f81b0d62c

    • SSDEEP

      3072:FghID3ikQ3zhVaAaPxBwOPgJGpFqriFzdFhKHjxQOA8Lvx7lS1BY+yTZoJJHv8X:sFl9JGKiJEDWd8LxUMbZoJJPM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks