General

  • Target

    dcf024f3359c3a752e582c5a6a2efdb0748aa87f8ef168f623f4140b184d320fN.exe

  • Size

    31KB

  • Sample

    241126-c1wx3swnbl

  • MD5

    d1fff5d5b5661647fd95a87e497fbd10

  • SHA1

    68563815edb3943b69e446dc0643cc39059819b5

  • SHA256

    dcf024f3359c3a752e582c5a6a2efdb0748aa87f8ef168f623f4140b184d320f

  • SHA512

    c9d8bb48d934fcbe8a3e95e9e02e188f0c372e549816297b86d3f05d284c2dc443bded37fb5176fc585f5e42ffb56475737d6a961f59d7646ac16e98ca4bd63c

  • SSDEEP

    768:zDMXZwpJbb2zxxO5oaqHhisfvagQmIDUu0tiicj:UkKZisrQVkaj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

192.168.199.2:6522

Mutex

266d34e804b5bdc8c81bfaefe4d0b785

Attributes
  • reg_key

    266d34e804b5bdc8c81bfaefe4d0b785

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      dcf024f3359c3a752e582c5a6a2efdb0748aa87f8ef168f623f4140b184d320fN.exe

    • Size

      31KB

    • MD5

      d1fff5d5b5661647fd95a87e497fbd10

    • SHA1

      68563815edb3943b69e446dc0643cc39059819b5

    • SHA256

      dcf024f3359c3a752e582c5a6a2efdb0748aa87f8ef168f623f4140b184d320f

    • SHA512

      c9d8bb48d934fcbe8a3e95e9e02e188f0c372e549816297b86d3f05d284c2dc443bded37fb5176fc585f5e42ffb56475737d6a961f59d7646ac16e98ca4bd63c

    • SSDEEP

      768:zDMXZwpJbb2zxxO5oaqHhisfvagQmIDUu0tiicj:UkKZisrQVkaj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks