General

  • Target

    dae3d1b1657c507b739b29ef31f6f13852ab4c67bc57ebe2a8e088dc1571dd63

  • Size

    23KB

  • Sample

    241130-e63c6asnfv

  • MD5

    73227233ab2bd7806dc87619e618867b

  • SHA1

    6378f9938a55186ad02877d99c1fb04b81b20a9e

  • SHA256

    dae3d1b1657c507b739b29ef31f6f13852ab4c67bc57ebe2a8e088dc1571dd63

  • SHA512

    f756499d407abe076344fee1b51d86aff337f4a37306c755f87df5f0eb6c90f445fca39e0323fd1311951c8a2b6b1beca1d61c0b5d9fd05d0d9705978e83d5dd

  • SSDEEP

    384:nGwz6+T4IjWZFNwXU0eiNUB4vt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZKn:1TbC81NbRpcnub

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.99:1080

Mutex

b5981a4b94d20b88e92909f65ce364f8

Attributes
  • reg_key

    b5981a4b94d20b88e92909f65ce364f8

  • splitter

    |'|'|

Targets

    • Target

      dae3d1b1657c507b739b29ef31f6f13852ab4c67bc57ebe2a8e088dc1571dd63

    • Size

      23KB

    • MD5

      73227233ab2bd7806dc87619e618867b

    • SHA1

      6378f9938a55186ad02877d99c1fb04b81b20a9e

    • SHA256

      dae3d1b1657c507b739b29ef31f6f13852ab4c67bc57ebe2a8e088dc1571dd63

    • SHA512

      f756499d407abe076344fee1b51d86aff337f4a37306c755f87df5f0eb6c90f445fca39e0323fd1311951c8a2b6b1beca1d61c0b5d9fd05d0d9705978e83d5dd

    • SSDEEP

      384:nGwz6+T4IjWZFNwXU0eiNUB4vt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZKn:1TbC81NbRpcnub

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks