General

  • Target

    a806f7211ce225fce8c1527a0bdbeec0a195b3827475af2cd3cb08aa648ebaaa.exe

  • Size

    31KB

  • Sample

    241125-zj5j8avqb1

  • MD5

    a476d8182cef5f482a38e886023bb8df

  • SHA1

    9ef3984819f6696967d36e04ccb6469bef090745

  • SHA256

    a806f7211ce225fce8c1527a0bdbeec0a195b3827475af2cd3cb08aa648ebaaa

  • SHA512

    bb9944af76d5a4334e941a294bd0934108cfae6e83a4b3ec0cd92da2f059ae5268d930c49781a1996912c8b22ad176344bffa1ecb9a2dd302b8e4a51b46bea44

  • SSDEEP

    768:zDMXZwpJbb2zxxO5oaqHhisfvagQmIDUu0tiicjL:UkKZisrQVkajL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

192.168.199.2:6522

Mutex

266d34e804b5bdc8c81bfaefe4d0b785

Attributes
  • reg_key

    266d34e804b5bdc8c81bfaefe4d0b785

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      a806f7211ce225fce8c1527a0bdbeec0a195b3827475af2cd3cb08aa648ebaaa.exe

    • Size

      31KB

    • MD5

      a476d8182cef5f482a38e886023bb8df

    • SHA1

      9ef3984819f6696967d36e04ccb6469bef090745

    • SHA256

      a806f7211ce225fce8c1527a0bdbeec0a195b3827475af2cd3cb08aa648ebaaa

    • SHA512

      bb9944af76d5a4334e941a294bd0934108cfae6e83a4b3ec0cd92da2f059ae5268d930c49781a1996912c8b22ad176344bffa1ecb9a2dd302b8e4a51b46bea44

    • SSDEEP

      768:zDMXZwpJbb2zxxO5oaqHhisfvagQmIDUu0tiicjL:UkKZisrQVkajL

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks