General

  • Target

    f93fece9d5a92259d55765581177888c37cfc09661640106b967c84f6f8b2191

  • Size

    23KB

  • Sample

    241220-lgxjyavjh1

  • MD5

    0969d778d1cb589b8f44015fdb1d509e

  • SHA1

    3d91bc34cda37e685082e3ca77764f5edf708d56

  • SHA256

    f93fece9d5a92259d55765581177888c37cfc09661640106b967c84f6f8b2191

  • SHA512

    c68c76b7f9a5fb46fef9d0b5bc2df347c497c570c53ee4b43e84d5a2a9658a340a0a458ca094fa1a80b8957a0689989c98f1060f092bafbdd4ea07bbce8cdb8a

  • SSDEEP

    384:Xc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZs2:Ve9EJLN/yRpcnu4

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

zaki220.servegame.com:1177

Mutex

eaf80d5210968bcd9b81be06e24c19e9

Attributes
  • reg_key

    eaf80d5210968bcd9b81be06e24c19e9

  • splitter

    |'|'|

Targets

    • Target

      f93fece9d5a92259d55765581177888c37cfc09661640106b967c84f6f8b2191

    • Size

      23KB

    • MD5

      0969d778d1cb589b8f44015fdb1d509e

    • SHA1

      3d91bc34cda37e685082e3ca77764f5edf708d56

    • SHA256

      f93fece9d5a92259d55765581177888c37cfc09661640106b967c84f6f8b2191

    • SHA512

      c68c76b7f9a5fb46fef9d0b5bc2df347c497c570c53ee4b43e84d5a2a9658a340a0a458ca094fa1a80b8957a0689989c98f1060f092bafbdd4ea07bbce8cdb8a

    • SSDEEP

      384:Xc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZs2:Ve9EJLN/yRpcnu4

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks