General

  • Target

    c84b5d5a9128bc706e2183174d2ac8aaeedda49600ca29cfc421a55c05b9cf61.exe

  • Size

    119KB

  • Sample

    241202-rgmbvswrfx

  • MD5

    af454620f79eede65c7b09603d3f579c

  • SHA1

    01a591c3a88bacf7771290206e8688a078e381b1

  • SHA256

    c84b5d5a9128bc706e2183174d2ac8aaeedda49600ca29cfc421a55c05b9cf61

  • SHA512

    86e5b0f2f247a66009ae293aa2a470ea11bd6ace44403b9551e51d6a19181d9dae6385a5071306bdded12f5c5fd7d56fdaf0be13624d2527712d226cf38f789e

  • SSDEEP

    3072:8ZhHgkuihetm9lIiDP1TWU/rTWpYn1FdvzmIxdwbECAjIxVWj9:8XH392igU//Wo1FRQbEJjIij9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

zayn2014.no-ip.org:5552

Mutex

50c56171c4e59c7d0e806bb89afce844

Attributes
  • reg_key

    50c56171c4e59c7d0e806bb89afce844

  • splitter

    |'|'|

Targets

    • Target

      c84b5d5a9128bc706e2183174d2ac8aaeedda49600ca29cfc421a55c05b9cf61.exe

    • Size

      119KB

    • MD5

      af454620f79eede65c7b09603d3f579c

    • SHA1

      01a591c3a88bacf7771290206e8688a078e381b1

    • SHA256

      c84b5d5a9128bc706e2183174d2ac8aaeedda49600ca29cfc421a55c05b9cf61

    • SHA512

      86e5b0f2f247a66009ae293aa2a470ea11bd6ace44403b9551e51d6a19181d9dae6385a5071306bdded12f5c5fd7d56fdaf0be13624d2527712d226cf38f789e

    • SSDEEP

      3072:8ZhHgkuihetm9lIiDP1TWU/rTWpYn1FdvzmIxdwbECAjIxVWj9:8XH392igU//Wo1FRQbEJjIij9

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks