General

  • Target

    3186e13abff43557c88c7fd9e6b0b8fad37e6a9c547af66d2e657aa6a593f48dN.exe

  • Size

    23KB

  • Sample

    241124-jtxpcsxkdj

  • MD5

    696b12405c1c65d06b07019d4393d7f0

  • SHA1

    684793b061900674b8aa2e054c1f6ded4e70eadf

  • SHA256

    3186e13abff43557c88c7fd9e6b0b8fad37e6a9c547af66d2e657aa6a593f48d

  • SHA512

    adf41772cb2c6d4b5da9b108a555e5dd0e1841b1fede6cb4ad7f3bf42532ec99a05af6d907cc8171ecce718cab7f8e5868eaa438251424c309b02b1a6ed47430

  • SSDEEP

    384:qoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIz:N7O89p2rRpcnuV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      3186e13abff43557c88c7fd9e6b0b8fad37e6a9c547af66d2e657aa6a593f48dN.exe

    • Size

      23KB

    • MD5

      696b12405c1c65d06b07019d4393d7f0

    • SHA1

      684793b061900674b8aa2e054c1f6ded4e70eadf

    • SHA256

      3186e13abff43557c88c7fd9e6b0b8fad37e6a9c547af66d2e657aa6a593f48d

    • SHA512

      adf41772cb2c6d4b5da9b108a555e5dd0e1841b1fede6cb4ad7f3bf42532ec99a05af6d907cc8171ecce718cab7f8e5868eaa438251424c309b02b1a6ed47430

    • SSDEEP

      384:qoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIz:N7O89p2rRpcnuV

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks