General

  • Target

    7dc6f983812204ae8a4f6fdc87c0b068c562dee184b268e04391975c582be708.exe

  • Size

    1.2MB

  • Sample

    241204-gsqtbazqan

  • MD5

    0892da2c8fbf043ae276100f9c7ec8ba

  • SHA1

    7237c52c96efcfa0105f0cdaf37245f0b29685de

  • SHA256

    7dc6f983812204ae8a4f6fdc87c0b068c562dee184b268e04391975c582be708

  • SHA512

    c547262992a16e873c39997f6e892d0959474efc78d99330160fa82621a732f297100fe73ecb3d520e4053087bbd9428f11be695d8f83c02a08be3dd010bc77e

  • SSDEEP

    24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95G:Jh+ZkldoPK8YaW7CaZ7IHG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

redlanhopto

C2

redlan.hopto.org:5553

Mutex

d25d360449d7bab3069e1b77b3a914a3

Attributes
  • reg_key

    d25d360449d7bab3069e1b77b3a914a3

  • splitter

    |'|'|

Targets

    • Target

      7dc6f983812204ae8a4f6fdc87c0b068c562dee184b268e04391975c582be708.exe

    • Size

      1.2MB

    • MD5

      0892da2c8fbf043ae276100f9c7ec8ba

    • SHA1

      7237c52c96efcfa0105f0cdaf37245f0b29685de

    • SHA256

      7dc6f983812204ae8a4f6fdc87c0b068c562dee184b268e04391975c582be708

    • SHA512

      c547262992a16e873c39997f6e892d0959474efc78d99330160fa82621a732f297100fe73ecb3d520e4053087bbd9428f11be695d8f83c02a08be3dd010bc77e

    • SSDEEP

      24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95G:Jh+ZkldoPK8YaW7CaZ7IHG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks