General

  • Target

    aab4bbb4b5d54e94c36586ddbe9c52b4911e631f41db792f19ac42cab42dc0c6.exe

  • Size

    23KB

  • Sample

    241211-kpmt2avqcw

  • MD5

    22af63c468011874892225dfa740fdbb

  • SHA1

    30d08c2013486868af5cbbf2a2379edd2f57d3ac

  • SHA256

    aab4bbb4b5d54e94c36586ddbe9c52b4911e631f41db792f19ac42cab42dc0c6

  • SHA512

    b3c35e6c75e0e01ebb2e276bee32754611c7c9d025d55666861f7f7a9151182654559594ec85e854927935e151a6b079dd39859595bba82dc9ce7de01638a197

  • SSDEEP

    384:qoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI1T:N7O89p2rRpcnu3T

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      aab4bbb4b5d54e94c36586ddbe9c52b4911e631f41db792f19ac42cab42dc0c6.exe

    • Size

      23KB

    • MD5

      22af63c468011874892225dfa740fdbb

    • SHA1

      30d08c2013486868af5cbbf2a2379edd2f57d3ac

    • SHA256

      aab4bbb4b5d54e94c36586ddbe9c52b4911e631f41db792f19ac42cab42dc0c6

    • SHA512

      b3c35e6c75e0e01ebb2e276bee32754611c7c9d025d55666861f7f7a9151182654559594ec85e854927935e151a6b079dd39859595bba82dc9ce7de01638a197

    • SSDEEP

      384:qoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZI1T:N7O89p2rRpcnu3T

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks