General

  • Target

    d61bb4aa2e82def04b2ba033ccb96e39c212ffeaa1cc8139bfd36df8768c5147.exe

  • Size

    584KB

  • Sample

    241130-dr99sayrhx

  • MD5

    6ff5223b48e9ea7e505ad7980c961f60

  • SHA1

    02a728d3b11f12a6be9e2d36201eeed6bf409570

  • SHA256

    d61bb4aa2e82def04b2ba033ccb96e39c212ffeaa1cc8139bfd36df8768c5147

  • SHA512

    dc845aeedc904a21a32d960c8b8983c65557716669a268cac12d70eb13cf766f9147d4db7c104b9d8736cefc0a59b545452bd5b6af41b97584e2b36ce69ec670

  • SSDEEP

    12288:mqEfpOSxyOF6q/68tLZL+w2hK3x8HPObaoE3anW2YrdAh:mqSOStFYA+Kh8HPObfEqner8

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

aboudmonster.no-ip.biz:1177

Mutex

0e8ba634604a9137fcb419c959897c24

Attributes
  • reg_key

    0e8ba634604a9137fcb419c959897c24

  • splitter

    |'|'|

Targets

    • Target

      d61bb4aa2e82def04b2ba033ccb96e39c212ffeaa1cc8139bfd36df8768c5147.exe

    • Size

      584KB

    • MD5

      6ff5223b48e9ea7e505ad7980c961f60

    • SHA1

      02a728d3b11f12a6be9e2d36201eeed6bf409570

    • SHA256

      d61bb4aa2e82def04b2ba033ccb96e39c212ffeaa1cc8139bfd36df8768c5147

    • SHA512

      dc845aeedc904a21a32d960c8b8983c65557716669a268cac12d70eb13cf766f9147d4db7c104b9d8736cefc0a59b545452bd5b6af41b97584e2b36ce69ec670

    • SSDEEP

      12288:mqEfpOSxyOF6q/68tLZL+w2hK3x8HPObaoE3anW2YrdAh:mqSOStFYA+Kh8HPObfEqner8

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks