General

  • Target

    940a6a70a6b820f5f31ac68a2582d2197cd62f4ba30330ddbe23cf23b41f1376.exe

  • Size

    1.2MB

  • Sample

    241218-nn95qaxkat

  • MD5

    ef28cd27628365a72256734320fa571a

  • SHA1

    acb09fbee054b26359409bb4bab193b17aa1c7bc

  • SHA256

    940a6a70a6b820f5f31ac68a2582d2197cd62f4ba30330ddbe23cf23b41f1376

  • SHA512

    be4eae7b8ab5da75cf64cafc8cb79d32d60444954a426ce6d0a1fb51570dc7d2367ebc11f4b57ffbc48c34f7bf71624ff3fde8cdbf9803b89bc664b0e0c753c5

  • SSDEEP

    24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95j:Jh+ZkldoPK8YaW7CaZ7IHj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

redlanhopto

C2

redlan.hopto.org:5553

Mutex

d25d360449d7bab3069e1b77b3a914a3

Attributes
  • reg_key

    d25d360449d7bab3069e1b77b3a914a3

  • splitter

    |'|'|

Targets

    • Target

      940a6a70a6b820f5f31ac68a2582d2197cd62f4ba30330ddbe23cf23b41f1376.exe

    • Size

      1.2MB

    • MD5

      ef28cd27628365a72256734320fa571a

    • SHA1

      acb09fbee054b26359409bb4bab193b17aa1c7bc

    • SHA256

      940a6a70a6b820f5f31ac68a2582d2197cd62f4ba30330ddbe23cf23b41f1376

    • SHA512

      be4eae7b8ab5da75cf64cafc8cb79d32d60444954a426ce6d0a1fb51570dc7d2367ebc11f4b57ffbc48c34f7bf71624ff3fde8cdbf9803b89bc664b0e0c753c5

    • SSDEEP

      24576:eAHnh+eWsN3skA4RV1Hom2KXMmHaW7aWvCaFg5a7PCmWX95j:Jh+ZkldoPK8YaW7CaZ7IHj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks