General

  • Target

    d5eaaa22cd69c6ddf1da7b0c8bd0cabbcda679810ed2d95839c08244235fbf81.exe

  • Size

    23KB

  • Sample

    241214-qtb6zstlcx

  • MD5

    a7a2022d715b3ecb85ea55de936f011b

  • SHA1

    0200512447f2e95d1675b1833d008ea4a7ddaa94

  • SHA256

    d5eaaa22cd69c6ddf1da7b0c8bd0cabbcda679810ed2d95839c08244235fbf81

  • SHA512

    7a0910ef562cb5936ab94fa94dce05eec2d6add7d6c3be3e8ad79a9710bc4fc283aec2d2f20dc6d4b0d641df5a8b1e368e6438f8e04c8f24a61b262d60ce5901

  • SSDEEP

    384:KY324bcgPiJLQrfARGSRUJsbY6vgvSMBD3t8mRvR6JZlbw8hqIusZzZMT:dL2s+tRARpcnu1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.11.110:4444

Mutex

42db17215651017a223d2108cb096394

Attributes
  • reg_key

    42db17215651017a223d2108cb096394

  • splitter

    |'|'|

Targets

    • Target

      d5eaaa22cd69c6ddf1da7b0c8bd0cabbcda679810ed2d95839c08244235fbf81.exe

    • Size

      23KB

    • MD5

      a7a2022d715b3ecb85ea55de936f011b

    • SHA1

      0200512447f2e95d1675b1833d008ea4a7ddaa94

    • SHA256

      d5eaaa22cd69c6ddf1da7b0c8bd0cabbcda679810ed2d95839c08244235fbf81

    • SHA512

      7a0910ef562cb5936ab94fa94dce05eec2d6add7d6c3be3e8ad79a9710bc4fc283aec2d2f20dc6d4b0d641df5a8b1e368e6438f8e04c8f24a61b262d60ce5901

    • SSDEEP

      384:KY324bcgPiJLQrfARGSRUJsbY6vgvSMBD3t8mRvR6JZlbw8hqIusZzZMT:dL2s+tRARpcnu1

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks