General

  • Target

    af5283158b38b61c96c3e50aac904c0b202df9b651cbdadfd8dd3d55e1bde94e.exe

  • Size

    102KB

  • Sample

    241204-benh5sypgj

  • MD5

    24195853ff2e9a4d421d1c77cc86c5b1

  • SHA1

    c00af4632d37f2a4d5198eff0bb08f5d7478632f

  • SHA256

    af5283158b38b61c96c3e50aac904c0b202df9b651cbdadfd8dd3d55e1bde94e

  • SHA512

    dedeb06f18c6306fc069e9e722e037606aa39200c1196bff20ce894ab4b12ca70367e7f7cd66d91a9353c8844ac774965f1d676c5e0f15945a7e4c2783bc8380

  • SSDEEP

    3072:0C3MFMCcB/tldVNFa1Vt05DHlFi2h7d8vCCYvyi:0C86CcB/tldVNFax+Di2hxIdCn

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

douda

C2

love2014.ddns.net:5584

Mutex

77ee8a49b5a8f18159dc862b4f0bcfb0

Attributes
  • reg_key

    77ee8a49b5a8f18159dc862b4f0bcfb0

  • splitter

    |'|'|

Targets

    • Target

      af5283158b38b61c96c3e50aac904c0b202df9b651cbdadfd8dd3d55e1bde94e.exe

    • Size

      102KB

    • MD5

      24195853ff2e9a4d421d1c77cc86c5b1

    • SHA1

      c00af4632d37f2a4d5198eff0bb08f5d7478632f

    • SHA256

      af5283158b38b61c96c3e50aac904c0b202df9b651cbdadfd8dd3d55e1bde94e

    • SHA512

      dedeb06f18c6306fc069e9e722e037606aa39200c1196bff20ce894ab4b12ca70367e7f7cd66d91a9353c8844ac774965f1d676c5e0f15945a7e4c2783bc8380

    • SSDEEP

      3072:0C3MFMCcB/tldVNFa1Vt05DHlFi2h7d8vCCYvyi:0C86CcB/tldVNFax+Di2hxIdCn

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks