General

  • Target

    b0e9c6186d3c44315e0e7ac52a30271c2452c4518738c21149d59a06f109cf5d.exe

  • Size

    23KB

  • Sample

    241127-xndwysskel

  • MD5

    289096a7dfa86410c8d43dce1e3e1984

  • SHA1

    81fbb841533c1fbfb8f3c26b00930b97b7cf08fd

  • SHA256

    b0e9c6186d3c44315e0e7ac52a30271c2452c4518738c21149d59a06f109cf5d

  • SHA512

    6558b90f9913526886c574b6da0b4ee27554eebd7a008fa3f6a73b4f82a3778f524d4269eefb6a502e6eb78ea91967c45d7631a88d84678826556bb288bfa06d

  • SSDEEP

    384:y8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZhBp:lXcwt3tRpcnugp

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

TAKTOUKA

C2

127.0.0.1:8090

Mutex

2239074f375016b7c06b239673132d3c

Attributes
  • reg_key

    2239074f375016b7c06b239673132d3c

  • splitter

    |'|'|

Targets

    • Target

      b0e9c6186d3c44315e0e7ac52a30271c2452c4518738c21149d59a06f109cf5d.exe

    • Size

      23KB

    • MD5

      289096a7dfa86410c8d43dce1e3e1984

    • SHA1

      81fbb841533c1fbfb8f3c26b00930b97b7cf08fd

    • SHA256

      b0e9c6186d3c44315e0e7ac52a30271c2452c4518738c21149d59a06f109cf5d

    • SHA512

      6558b90f9913526886c574b6da0b4ee27554eebd7a008fa3f6a73b4f82a3778f524d4269eefb6a502e6eb78ea91967c45d7631a88d84678826556bb288bfa06d

    • SSDEEP

      384:y8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZhBp:lXcwt3tRpcnugp

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks