General

  • Target

    f782b67a7c1d4504d282bbabca3bfff4dcb14b989225695b8a80e0aedc3a9953N.exe

  • Size

    94KB

  • Sample

    241216-mnes5swrb1

  • MD5

    2086ab4be1e7ec95fa9ccf40895986e0

  • SHA1

    3d877603fbdb832bc59af3700547e27d7a34f9f3

  • SHA256

    f782b67a7c1d4504d282bbabca3bfff4dcb14b989225695b8a80e0aedc3a9953

  • SHA512

    88b9730600ed98466e620537aa0f04eed23bcf8f4b7b6bb55eafaea68d727bfdc23e62a780b636078f9c5223eb85a0d21bfb2ec78742d71ad9a8105e4a507a9a

  • SSDEEP

    1536:ToCHfmQnPG8baRYX2Nb5sVo/wgTedTK+ueIS5bhUjnPWyJhDNWcb5t4U9tj8MYuS:ToktPG8baRYX2N9HTA3YVhD55/tQG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

jh34j4h34h.ddns.net:1177

Mutex

4a8f2ff0614688c198a022511337d8fb

Attributes
  • reg_key

    4a8f2ff0614688c198a022511337d8fb

  • splitter

    |'|'|

Targets

    • Target

      f782b67a7c1d4504d282bbabca3bfff4dcb14b989225695b8a80e0aedc3a9953N.exe

    • Size

      94KB

    • MD5

      2086ab4be1e7ec95fa9ccf40895986e0

    • SHA1

      3d877603fbdb832bc59af3700547e27d7a34f9f3

    • SHA256

      f782b67a7c1d4504d282bbabca3bfff4dcb14b989225695b8a80e0aedc3a9953

    • SHA512

      88b9730600ed98466e620537aa0f04eed23bcf8f4b7b6bb55eafaea68d727bfdc23e62a780b636078f9c5223eb85a0d21bfb2ec78742d71ad9a8105e4a507a9a

    • SSDEEP

      1536:ToCHfmQnPG8baRYX2Nb5sVo/wgTedTK+ueIS5bhUjnPWyJhDNWcb5t4U9tj8MYuS:ToktPG8baRYX2N9HTA3YVhD55/tQG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks