General

  • Target

    f75e8a6e2f017c2a66476dc9257d1465e5b891b35fd7a58d544faf17ab0122ddN.exe

  • Size

    1.2MB

  • Sample

    241202-vcfkasspgy

  • MD5

    f583d334c2d7b0993a306101b00c90f0

  • SHA1

    9c872e81f2b5ab31ff6f289f82046ce68ce49889

  • SHA256

    f75e8a6e2f017c2a66476dc9257d1465e5b891b35fd7a58d544faf17ab0122dd

  • SHA512

    a21b1b94988d7e9ab0c5d411fb58c4e809eed27a842eea554794e27dae83673c54395a34145ec06d4ef3a15472f3096e968d3ebb1af6617491b1bc286966934d

  • SSDEEP

    24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95G:Jh+ZkldoPK8YaW7CaZ7IHG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

redlanhopto

C2

redlan.hopto.org:5553

Mutex

d25d360449d7bab3069e1b77b3a914a3

Attributes
  • reg_key

    d25d360449d7bab3069e1b77b3a914a3

  • splitter

    |'|'|

Targets

    • Target

      f75e8a6e2f017c2a66476dc9257d1465e5b891b35fd7a58d544faf17ab0122ddN.exe

    • Size

      1.2MB

    • MD5

      f583d334c2d7b0993a306101b00c90f0

    • SHA1

      9c872e81f2b5ab31ff6f289f82046ce68ce49889

    • SHA256

      f75e8a6e2f017c2a66476dc9257d1465e5b891b35fd7a58d544faf17ab0122dd

    • SHA512

      a21b1b94988d7e9ab0c5d411fb58c4e809eed27a842eea554794e27dae83673c54395a34145ec06d4ef3a15472f3096e968d3ebb1af6617491b1bc286966934d

    • SSDEEP

      24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95G:Jh+ZkldoPK8YaW7CaZ7IHG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks