General

  • Target

    Server.exe

  • Size

    93KB

  • Sample

    241219-y64qrsyrdm

  • MD5

    478f6b8a8f1a60a3ed7d7158c7870433

  • SHA1

    6143a06c120d6a238d13fd7a63acd99fe96082a2

  • SHA256

    0ea9fe75f4b92fa4db859243bc898d62b20b974dca80fc0558a0afb418564930

  • SHA512

    bb4ec3dc99a860dc6686980497b6b2dfdef9988104ed2cb3d62285e8a3d3359fedc3230775655041ebb3e5bd033d52727c88385cf19d9240d7fbe7f3e866b285

  • SSDEEP

    768:uY3Wbi6xgrKSMZAZL28d2WmtlX+jRoI++WqXxrjEtCdnl2pi1Rz4Rk3JhsGdpSgM:wbvxg1L2AZmDO+2jEwzGi1dDLDSgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

66.29.28.194:25565

Mutex

d0f07874cbb7a0a6f92d29b71f7e122d

Attributes
  • reg_key

    d0f07874cbb7a0a6f92d29b71f7e122d

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      93KB

    • MD5

      478f6b8a8f1a60a3ed7d7158c7870433

    • SHA1

      6143a06c120d6a238d13fd7a63acd99fe96082a2

    • SHA256

      0ea9fe75f4b92fa4db859243bc898d62b20b974dca80fc0558a0afb418564930

    • SHA512

      bb4ec3dc99a860dc6686980497b6b2dfdef9988104ed2cb3d62285e8a3d3359fedc3230775655041ebb3e5bd033d52727c88385cf19d9240d7fbe7f3e866b285

    • SSDEEP

      768:uY3Wbi6xgrKSMZAZL28d2WmtlX+jRoI++WqXxrjEtCdnl2pi1Rz4Rk3JhsGdpSgM:wbvxg1L2AZmDO+2jEwzGi1dDLDSgS

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks