General

  • Target

    36882afaff37f70be8d2566f1b4f8a05764c27305f4809002f1ee2822b6d8ea5.exe

  • Size

    23KB

  • Sample

    241214-dnyrkstjfw

  • MD5

    8a71e8ebf8c24d8f7b48a29fc023815e

  • SHA1

    3c279527d5f1dba32466fbd19b7d073df291e596

  • SHA256

    36882afaff37f70be8d2566f1b4f8a05764c27305f4809002f1ee2822b6d8ea5

  • SHA512

    258c88e0993258f091b5ce3bd57aae8be0d8f30be0f420aea08bad9a99242e1f246a6c140c933fc088b6ada2b1046f1195c3030593ce1338fb77925452348a4e

  • SSDEEP

    384:x8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZbwT:iXcwt3tRpcnut

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.0.0.16:1177

Mutex

c7c410475d4d33dd6b97dc1e4dc051b8

Attributes
  • reg_key

    c7c410475d4d33dd6b97dc1e4dc051b8

  • splitter

    |'|'|

Targets

    • Target

      36882afaff37f70be8d2566f1b4f8a05764c27305f4809002f1ee2822b6d8ea5.exe

    • Size

      23KB

    • MD5

      8a71e8ebf8c24d8f7b48a29fc023815e

    • SHA1

      3c279527d5f1dba32466fbd19b7d073df291e596

    • SHA256

      36882afaff37f70be8d2566f1b4f8a05764c27305f4809002f1ee2822b6d8ea5

    • SHA512

      258c88e0993258f091b5ce3bd57aae8be0d8f30be0f420aea08bad9a99242e1f246a6c140c933fc088b6ada2b1046f1195c3030593ce1338fb77925452348a4e

    • SSDEEP

      384:x8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZbwT:iXcwt3tRpcnut

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks