General

  • Target

    2535dab866aeabc12488bc90619abcb4939ae7009b4ff26a4009cf92d4f82695N.exe

  • Size

    23KB

  • Sample

    241201-3cyd4sxkhv

  • MD5

    655d53c36016d5c848370ff66e8327b0

  • SHA1

    77fc1ce3857585a22c7bd36e7113439be232825a

  • SHA256

    2535dab866aeabc12488bc90619abcb4939ae7009b4ff26a4009cf92d4f82695

  • SHA512

    25800b224fbcbf3bbcbb34185a8c544b97d888d4072462c6bad8fcba14f844a0e73570da57d93ab4966b9ceaff711a5bd42ddb7f66a35edae467a343a5239a2b

  • SSDEEP

    384:wnoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI4:17O89p2rRpcnu+

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      2535dab866aeabc12488bc90619abcb4939ae7009b4ff26a4009cf92d4f82695N.exe

    • Size

      23KB

    • MD5

      655d53c36016d5c848370ff66e8327b0

    • SHA1

      77fc1ce3857585a22c7bd36e7113439be232825a

    • SHA256

      2535dab866aeabc12488bc90619abcb4939ae7009b4ff26a4009cf92d4f82695

    • SHA512

      25800b224fbcbf3bbcbb34185a8c544b97d888d4072462c6bad8fcba14f844a0e73570da57d93ab4966b9ceaff711a5bd42ddb7f66a35edae467a343a5239a2b

    • SSDEEP

      384:wnoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI4:17O89p2rRpcnu+

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks