General

  • Target

    1b686004db276e1742e659d6fe4eda1a4e5fa7579d208c7b7c675d65bafe4b5b.exe

  • Size

    131KB

  • Sample

    241129-s8qn2axrgp

  • MD5

    7593f02bfbb8aee2c614fa57fc573663

  • SHA1

    2bf98e5b9655c17907d3fb2a10ed6c3704bece45

  • SHA256

    1b686004db276e1742e659d6fe4eda1a4e5fa7579d208c7b7c675d65bafe4b5b

  • SHA512

    761b99affcbc85a6ff07ea107eed8155950d4a48a83740e6d8b35134dcf0d6b18a5ba0fca81a07ff0326096a2b80fa45fc1ac7f8dd92e852ee28954dfa4fff0c

  • SSDEEP

    3072:ibxSTpiG8wMZJYKR5Gevfj7rZyqEX25Ny5k1jNfLbvu:ibx4ij9LjlvYX25Y5kxpf2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

systemftp.serveftp.com:19495

Mutex

c154dc1439ce42713df8b7de38bd1b02

Attributes
  • reg_key

    c154dc1439ce42713df8b7de38bd1b02

  • splitter

    |'|'|

Targets

    • Target

      1b686004db276e1742e659d6fe4eda1a4e5fa7579d208c7b7c675d65bafe4b5b.exe

    • Size

      131KB

    • MD5

      7593f02bfbb8aee2c614fa57fc573663

    • SHA1

      2bf98e5b9655c17907d3fb2a10ed6c3704bece45

    • SHA256

      1b686004db276e1742e659d6fe4eda1a4e5fa7579d208c7b7c675d65bafe4b5b

    • SHA512

      761b99affcbc85a6ff07ea107eed8155950d4a48a83740e6d8b35134dcf0d6b18a5ba0fca81a07ff0326096a2b80fa45fc1ac7f8dd92e852ee28954dfa4fff0c

    • SSDEEP

      3072:ibxSTpiG8wMZJYKR5Gevfj7rZyqEX25Ny5k1jNfLbvu:ibx4ij9LjlvYX25Y5kxpf2

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks