Resubmissions

05-12-2024 01:46

241205-b6z19axpfn 10

05-12-2024 00:25

241205-aq4ttsyncv 10

General

  • Target

    908225291224a1234122a141319807eba04040d97a311c0c0eacbb5591ff53fd

  • Size

    29KB

  • Sample

    241205-aq4ttsyncv

  • MD5

    a3bebd489a0b4c4dce0673ef8b6b6754

  • SHA1

    1767b75bb4a4d5dd8f4b06589b4544b89b774aa9

  • SHA256

    908225291224a1234122a141319807eba04040d97a311c0c0eacbb5591ff53fd

  • SHA512

    9d977a226f9b9ec2037d5bf272857a662af637ceb9b319d1fb048a923b29a893d01c3799f20595e3fb2fdb1eec96a82b26a69467b74791fa614d013306bba51d

  • SSDEEP

    384:Y7hkrLGN8fNl7L5H4yAyr9n95/K4ZoumqDYcqeYtGBsbh0w4wlAokw9OhgOL1vYB:Y67R4yAy944Aq1qe5BKh0p29SgRN5

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

192.168.1.107:2278

Mutex

b3d7ad373951cd040fb05f6d6f5bf314

Attributes
  • reg_key

    b3d7ad373951cd040fb05f6d6f5bf314

  • splitter

    |'|'|

Targets

    • Target

      908225291224a1234122a141319807eba04040d97a311c0c0eacbb5591ff53fd

    • Size

      29KB

    • MD5

      a3bebd489a0b4c4dce0673ef8b6b6754

    • SHA1

      1767b75bb4a4d5dd8f4b06589b4544b89b774aa9

    • SHA256

      908225291224a1234122a141319807eba04040d97a311c0c0eacbb5591ff53fd

    • SHA512

      9d977a226f9b9ec2037d5bf272857a662af637ceb9b319d1fb048a923b29a893d01c3799f20595e3fb2fdb1eec96a82b26a69467b74791fa614d013306bba51d

    • SSDEEP

      384:Y7hkrLGN8fNl7L5H4yAyr9n95/K4ZoumqDYcqeYtGBsbh0w4wlAokw9OhgOL1vYB:Y67R4yAy944Aq1qe5BKh0p29SgRN5

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks