General

  • Target

    58a66474908933e642c0b35c117ef9f3d508b2f9f27f41e26ba37e3b5744157fN.exe

  • Size

    23KB

  • Sample

    241127-njtl6s1pfy

  • MD5

    748ef33ecfae05ec3587ed482829c2e0

  • SHA1

    47a39f6bb7552e11f2316aa71749454a4786a107

  • SHA256

    58a66474908933e642c0b35c117ef9f3d508b2f9f27f41e26ba37e3b5744157f

  • SHA512

    cbedb455d7eaad3d0dcccb02fa72534f9c2cf7767ff0ce1aea1c37958c31d983608864b564be94a3571d9400bdf97844b1ecba5a0495fd110bafcf9fecc1a636

  • SSDEEP

    384:jYmdk8XvCJrQLdRGSiEYF7Y65gPyx6BDXNRmRvR6JZlbw8hqIusZzZX4:swWkti/aeRpcnub

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

nzweb2008-22511.portmap.host:22511

Mutex

334f132010bbc79a6e7c28a01892af18

Attributes
  • reg_key

    334f132010bbc79a6e7c28a01892af18

  • splitter

    |'|'|

Targets

    • Target

      58a66474908933e642c0b35c117ef9f3d508b2f9f27f41e26ba37e3b5744157fN.exe

    • Size

      23KB

    • MD5

      748ef33ecfae05ec3587ed482829c2e0

    • SHA1

      47a39f6bb7552e11f2316aa71749454a4786a107

    • SHA256

      58a66474908933e642c0b35c117ef9f3d508b2f9f27f41e26ba37e3b5744157f

    • SHA512

      cbedb455d7eaad3d0dcccb02fa72534f9c2cf7767ff0ce1aea1c37958c31d983608864b564be94a3571d9400bdf97844b1ecba5a0495fd110bafcf9fecc1a636

    • SSDEEP

      384:jYmdk8XvCJrQLdRGSiEYF7Y65gPyx6BDXNRmRvR6JZlbw8hqIusZzZX4:swWkti/aeRpcnub

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks