General

  • Target

    563276feb31bfe2ae44687979ce930c36dd7fb49c6d9b03e1d4ce3da8bbdc9e8N.exe

  • Size

    100KB

  • Sample

    241201-pgyzjsvrfm

  • MD5

    db6cfa38032e1c194f98b7fa9ef561f0

  • SHA1

    3312632cec959450b8fd0fd19572c51ea60ed602

  • SHA256

    563276feb31bfe2ae44687979ce930c36dd7fb49c6d9b03e1d4ce3da8bbdc9e8

  • SHA512

    3952afcac094297f0b49e0753d0a5432c060352a36e17181e7f01f68ab17af7bd2bc62885416478b9966c2442b37c17b0c0ac37aa97a4b499e8fef504777f15a

  • SSDEEP

    1536:JMoIfhO5PNZ4BkSQB68QJRlrNw+ZnIwk0+Be4X2EWpD7oi1VO+/t6F:+o2GNZMI8Rl5wyIwk79/sl8F

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

VICTIME2014b

C2

crazymaha.zapto.org:8181

Mutex

73fc908b8a1feca480a20b452ef82fcc

Attributes
  • reg_key

    73fc908b8a1feca480a20b452ef82fcc

  • splitter

    |'|'|

Targets

    • Target

      563276feb31bfe2ae44687979ce930c36dd7fb49c6d9b03e1d4ce3da8bbdc9e8N.exe

    • Size

      100KB

    • MD5

      db6cfa38032e1c194f98b7fa9ef561f0

    • SHA1

      3312632cec959450b8fd0fd19572c51ea60ed602

    • SHA256

      563276feb31bfe2ae44687979ce930c36dd7fb49c6d9b03e1d4ce3da8bbdc9e8

    • SHA512

      3952afcac094297f0b49e0753d0a5432c060352a36e17181e7f01f68ab17af7bd2bc62885416478b9966c2442b37c17b0c0ac37aa97a4b499e8fef504777f15a

    • SSDEEP

      1536:JMoIfhO5PNZ4BkSQB68QJRlrNw+ZnIwk0+Be4X2EWpD7oi1VO+/t6F:+o2GNZMI8Rl5wyIwk79/sl8F

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks