General

  • Target

    a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc

  • Size

    35KB

  • Sample

    241216-b5zdbsxmdz

  • MD5

    917235e2cc9fb5a974451973b4be23ce

  • SHA1

    3f2df07996d988d0bb443bafd75487da428f5389

  • SHA256

    a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc

  • SHA512

    d8f31ed4edd33472a3b0e3967b401688529b2d2e039f66652877a75990b4934808a4ff3d92e2b3c5d9dfabfbba8d17f58f7d3365abd6f9aeb2181c63760144ae

  • SSDEEP

    384:pLQ5CVFzG+7OA0VsMEvFO4xQi+yP+hhfMRAQk93vmhm7UMKmIEecKdbXTzm9bVh2:ZIfILxhRA/vMHTi9bDRJk6/i

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

ratr.zapto.org:5552

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc

    • Size

      35KB

    • MD5

      917235e2cc9fb5a974451973b4be23ce

    • SHA1

      3f2df07996d988d0bb443bafd75487da428f5389

    • SHA256

      a75cc6e666c7810a7c60d0b87f61ea983886227f4ca4de43d2ed8c87d38590dc

    • SHA512

      d8f31ed4edd33472a3b0e3967b401688529b2d2e039f66652877a75990b4934808a4ff3d92e2b3c5d9dfabfbba8d17f58f7d3365abd6f9aeb2181c63760144ae

    • SSDEEP

      384:pLQ5CVFzG+7OA0VsMEvFO4xQi+yP+hhfMRAQk93vmhm7UMKmIEecKdbXTzm9bVh2:ZIfILxhRA/vMHTi9bDRJk6/i

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks