General

  • Target

    37f025645ccb6d101c7110e06d8cc2332cd0ed72188be80fadc5efb7963b356b.exe

  • Size

    863KB

  • Sample

    241127-h2tf8stjgw

  • MD5

    cf620f72719d99e50a6a709fd6518f5c

  • SHA1

    fc4263088c1a08d73cc4ff2f50b7d4e0637f42b5

  • SHA256

    37f025645ccb6d101c7110e06d8cc2332cd0ed72188be80fadc5efb7963b356b

  • SHA512

    2114b8976f4338a002be4ccb4ca2bb3c9e72b474af2f781c5a5b47908135680f47a0735e301dd9cb46da4046645d6e2fbef1fd7e03c123be12f9e8a99f677f03

  • SSDEEP

    12288:q4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgav7o6Fq9MmCSm:q4lavt0LkLL9IMixoEgeajBFq9MmCSm

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.10.10:5552

Mutex

0dc24807523d3cd24b54cd0996e4c49b

Attributes
  • reg_key

    0dc24807523d3cd24b54cd0996e4c49b

  • splitter

    |'|'|

Targets

    • Target

      37f025645ccb6d101c7110e06d8cc2332cd0ed72188be80fadc5efb7963b356b.exe

    • Size

      863KB

    • MD5

      cf620f72719d99e50a6a709fd6518f5c

    • SHA1

      fc4263088c1a08d73cc4ff2f50b7d4e0637f42b5

    • SHA256

      37f025645ccb6d101c7110e06d8cc2332cd0ed72188be80fadc5efb7963b356b

    • SHA512

      2114b8976f4338a002be4ccb4ca2bb3c9e72b474af2f781c5a5b47908135680f47a0735e301dd9cb46da4046645d6e2fbef1fd7e03c123be12f9e8a99f677f03

    • SSDEEP

      12288:q4lsXvtCcmVVXzzn4PJAahPl/QEdIMiVbHydEIJnJWUgav7o6Fq9MmCSm:q4lavt0LkLL9IMixoEgeajBFq9MmCSm

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks