General

  • Target

    f62f7ccab9b9dc9e6876a65cdad855382a535adf3a189be8f4cab9180e51a4d4

  • Size

    23KB

  • Sample

    241212-fjj4qs1ngt

  • MD5

    e99ba45c0b874c8699b7799a7b74ac44

  • SHA1

    15f2db71c080c74ce9a7d31a0463d831f98a8b4f

  • SHA256

    f62f7ccab9b9dc9e6876a65cdad855382a535adf3a189be8f4cab9180e51a4d4

  • SHA512

    3c64b42beae02caf5b53882b88aea813136f0654a0bc2f3e89718bc6d14845504cd68cef500db0e760ede31aabe0a274c27e130443f7a8fb8357dd347354a165

  • SSDEEP

    384:QoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIe:f7O89p2rRpcnuQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      f62f7ccab9b9dc9e6876a65cdad855382a535adf3a189be8f4cab9180e51a4d4

    • Size

      23KB

    • MD5

      e99ba45c0b874c8699b7799a7b74ac44

    • SHA1

      15f2db71c080c74ce9a7d31a0463d831f98a8b4f

    • SHA256

      f62f7ccab9b9dc9e6876a65cdad855382a535adf3a189be8f4cab9180e51a4d4

    • SHA512

      3c64b42beae02caf5b53882b88aea813136f0654a0bc2f3e89718bc6d14845504cd68cef500db0e760ede31aabe0a274c27e130443f7a8fb8357dd347354a165

    • SSDEEP

      384:QoWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZIe:f7O89p2rRpcnuQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks