General

  • Target

    c5f73cf6bc2e63a457b85ce51a71588a20ed957fdd3d022f8bd23ebc63f0cfc3N.exe

  • Size

    23KB

  • Sample

    241216-wcsejaxlhr

  • MD5

    c6193fc3f383717b32c9ddce4d922510

  • SHA1

    3d93360f80eb8eecbc1b0048917fb35100e4b0b2

  • SHA256

    c5f73cf6bc2e63a457b85ce51a71588a20ed957fdd3d022f8bd23ebc63f0cfc3

  • SHA512

    c50d7d64595fa4f4d4ad2a94d41fbe66f93bb866e7647cf1c7ca3517acffa5436fa675e94ae1fa7d3d61218996c94de69a12a3126777227f4b3e4bfdfc296aab

  • SSDEEP

    384:2QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ3F:h5yBVd7Rpcnu6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

41.142.176.88:5552

Mutex

8e27539cbb14d942aad0b409f9d9f56f

Attributes
  • reg_key

    8e27539cbb14d942aad0b409f9d9f56f

  • splitter

    |'|'|

Targets

    • Target

      c5f73cf6bc2e63a457b85ce51a71588a20ed957fdd3d022f8bd23ebc63f0cfc3N.exe

    • Size

      23KB

    • MD5

      c6193fc3f383717b32c9ddce4d922510

    • SHA1

      3d93360f80eb8eecbc1b0048917fb35100e4b0b2

    • SHA256

      c5f73cf6bc2e63a457b85ce51a71588a20ed957fdd3d022f8bd23ebc63f0cfc3

    • SHA512

      c50d7d64595fa4f4d4ad2a94d41fbe66f93bb866e7647cf1c7ca3517acffa5436fa675e94ae1fa7d3d61218996c94de69a12a3126777227f4b3e4bfdfc296aab

    • SSDEEP

      384:2QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ3F:h5yBVd7Rpcnu6

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks