General

  • Target

    06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8

  • Size

    23KB

  • Sample

    241124-x6jvxsvpds

  • MD5

    dbd6e806a9569164117e585f0af40eef

  • SHA1

    3ba711b2eb5777970c393c5ccb1af6ff8736ffaf

  • SHA256

    06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8

  • SHA512

    d3ec6e916642cd3996a1e54ba1758a932400184569c8007e4d71732e3b3a39a1b125acfc24af56f3a155840d535e4b8539d8eef7e2480a4274e1900a06642a02

  • SSDEEP

    384:PTMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZad9:PMb9glF51LRpcnu19

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

djwolfdz2.ddns.net:3389

Mutex

9d770d5d68d419ae777037dcfd1a78d4

Attributes
  • reg_key

    9d770d5d68d419ae777037dcfd1a78d4

  • splitter

    |'|'|

Targets

    • Target

      06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8

    • Size

      23KB

    • MD5

      dbd6e806a9569164117e585f0af40eef

    • SHA1

      3ba711b2eb5777970c393c5ccb1af6ff8736ffaf

    • SHA256

      06acf1bd0a3c7ba9fd01b0f4a91a2dfe61a0296b6cb40da7ef6771e70ec64fe8

    • SHA512

      d3ec6e916642cd3996a1e54ba1758a932400184569c8007e4d71732e3b3a39a1b125acfc24af56f3a155840d535e4b8539d8eef7e2480a4274e1900a06642a02

    • SSDEEP

      384:PTMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZad9:PMb9glF51LRpcnu19

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks