General

  • Target

    fe42a97a272f23621e6589b4c003922a3bbffdc7288b50517e6045cee3db9e8aN.exe

  • Size

    23KB

  • Sample

    241130-zkv26syphr

  • MD5

    6e6d2f25fe0c0749d169b526d5b04d30

  • SHA1

    bdb9d5b480392c48974daede2d860c0e3f6f5bc8

  • SHA256

    fe42a97a272f23621e6589b4c003922a3bbffdc7288b50517e6045cee3db9e8a

  • SHA512

    701e0513483e6c08d9f99e5d71d0dac60bbb76a8cee4164f1a3fceb3c6d05f97c68e05e81c8f5c33a9e401dc7dc6ccf25bc0761fc235a13e06bc15cc827c7138

  • SSDEEP

    384:poWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI7:+7O89p2rRpcnuF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      fe42a97a272f23621e6589b4c003922a3bbffdc7288b50517e6045cee3db9e8aN.exe

    • Size

      23KB

    • MD5

      6e6d2f25fe0c0749d169b526d5b04d30

    • SHA1

      bdb9d5b480392c48974daede2d860c0e3f6f5bc8

    • SHA256

      fe42a97a272f23621e6589b4c003922a3bbffdc7288b50517e6045cee3db9e8a

    • SHA512

      701e0513483e6c08d9f99e5d71d0dac60bbb76a8cee4164f1a3fceb3c6d05f97c68e05e81c8f5c33a9e401dc7dc6ccf25bc0761fc235a13e06bc15cc827c7138

    • SSDEEP

      384:poWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI7:+7O89p2rRpcnuF

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks