General

  • Target

    739005ddcf4e566a01a2ec1dc3c35182c14d410b8945c072ddaf8d0af89bf2afN.exe

  • Size

    119KB

  • Sample

    241203-q8h8vayjht

  • MD5

    caff93afd132a28e1bd4ab2cfb4b8560

  • SHA1

    e7ee8d13f67782a01fd23116c63a5bff06993f0e

  • SHA256

    739005ddcf4e566a01a2ec1dc3c35182c14d410b8945c072ddaf8d0af89bf2af

  • SHA512

    4bacc59fffa80e17c758747cda7bb17ee832a800ea4ce253bccb1e4511f43422b2d10b0e752848d56c8da5fb6e1e560b3318ee6a518ca90f5212aa4d927c5f52

  • SSDEEP

    3072:8ZhHgkuihetm9lIiDP1TWU/rTWpYn1FdvzmIxdwbECAjIxVWj/:8XH392igU//Wo1FRQbEJjIij/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

zayn2014.no-ip.org:5552

Mutex

50c56171c4e59c7d0e806bb89afce844

Attributes
  • reg_key

    50c56171c4e59c7d0e806bb89afce844

  • splitter

    |'|'|

Targets

    • Target

      739005ddcf4e566a01a2ec1dc3c35182c14d410b8945c072ddaf8d0af89bf2afN.exe

    • Size

      119KB

    • MD5

      caff93afd132a28e1bd4ab2cfb4b8560

    • SHA1

      e7ee8d13f67782a01fd23116c63a5bff06993f0e

    • SHA256

      739005ddcf4e566a01a2ec1dc3c35182c14d410b8945c072ddaf8d0af89bf2af

    • SHA512

      4bacc59fffa80e17c758747cda7bb17ee832a800ea4ce253bccb1e4511f43422b2d10b0e752848d56c8da5fb6e1e560b3318ee6a518ca90f5212aa4d927c5f52

    • SSDEEP

      3072:8ZhHgkuihetm9lIiDP1TWU/rTWpYn1FdvzmIxdwbECAjIxVWj/:8XH392igU//Wo1FRQbEJjIij/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks