General

  • Target

    e898bc3c1f62316698a247b1536912d85ce459adb831664ceecc86bb86e2daf8N.exe

  • Size

    200KB

  • Sample

    241129-t26x4svrhw

  • MD5

    d6d213eccc1b10a9b47f8378e73f1da0

  • SHA1

    3bc7b77bbd7a128b3321087b3d4e8e79286fb53a

  • SHA256

    e898bc3c1f62316698a247b1536912d85ce459adb831664ceecc86bb86e2daf8

  • SHA512

    c2322b3fdb496ccbf8d010d83b16116862a9a110f4d39cae0eb736a237de2d805706ea000149db96795048d9ccd8dc7966c0908c752422dfa082d3e1f825c916

  • SSDEEP

    3072:vzNApH86O2S8xwpGuJdi4pPzGhtdbyuo1HHQNOgXD9zY5f2luxvSwSP7JKt6p:vzfGuWJBeuKHwAgXDNgf2luxvS/Dwt6p

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

VítimasDoMurkizin

C2

qualquernome.no-ip.org:3333

Mutex

a01dc1a702d6056e8de0f390892b3171

Attributes
  • reg_key

    a01dc1a702d6056e8de0f390892b3171

  • splitter

    |'|'|

Targets

    • Target

      e898bc3c1f62316698a247b1536912d85ce459adb831664ceecc86bb86e2daf8N.exe

    • Size

      200KB

    • MD5

      d6d213eccc1b10a9b47f8378e73f1da0

    • SHA1

      3bc7b77bbd7a128b3321087b3d4e8e79286fb53a

    • SHA256

      e898bc3c1f62316698a247b1536912d85ce459adb831664ceecc86bb86e2daf8

    • SHA512

      c2322b3fdb496ccbf8d010d83b16116862a9a110f4d39cae0eb736a237de2d805706ea000149db96795048d9ccd8dc7966c0908c752422dfa082d3e1f825c916

    • SSDEEP

      3072:vzNApH86O2S8xwpGuJdi4pPzGhtdbyuo1HHQNOgXD9zY5f2luxvSwSP7JKt6p:vzfGuWJBeuKHwAgXDNgf2luxvS/Dwt6p

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks