General

  • Target

    f3986e4b0bb008d732b607e41a95c94c551afabfc46e667cd19017ed6ba27f23.exe

  • Size

    2.0MB

  • Sample

    241203-f5rqpssjez

  • MD5

    41116c596c0aee6e3a2993945d24625d

  • SHA1

    40f0aa6ab8370ab35dd41cfb9d546b330e7ddc9a

  • SHA256

    f3986e4b0bb008d732b607e41a95c94c551afabfc46e667cd19017ed6ba27f23

  • SHA512

    1146b2546b7e575801d2e9a6e88aa8a4abc0a27e3359e37b666cb43ca2d10c811a03c4460963bcccc9f7b82d6c1e167e683d837193c115082105755eeec65bfa

  • SSDEEP

    49152:ckEGhFigxRw0Cm2LQrhTbBpKmT1To2nZK:pDwVLQrhTbamSsZK

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

=== + _ + === %WinDir%

C2

microsofthost.freeddns.org:40575

Mutex

bb20f14510d5756907e67527a3de9460

Attributes
  • reg_key

    bb20f14510d5756907e67527a3de9460

  • splitter

    |'|'|

Targets

    • Target

      f3986e4b0bb008d732b607e41a95c94c551afabfc46e667cd19017ed6ba27f23.exe

    • Size

      2.0MB

    • MD5

      41116c596c0aee6e3a2993945d24625d

    • SHA1

      40f0aa6ab8370ab35dd41cfb9d546b330e7ddc9a

    • SHA256

      f3986e4b0bb008d732b607e41a95c94c551afabfc46e667cd19017ed6ba27f23

    • SHA512

      1146b2546b7e575801d2e9a6e88aa8a4abc0a27e3359e37b666cb43ca2d10c811a03c4460963bcccc9f7b82d6c1e167e683d837193c115082105755eeec65bfa

    • SSDEEP

      49152:ckEGhFigxRw0Cm2LQrhTbBpKmT1To2nZK:pDwVLQrhTbamSsZK

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks