General

  • Target

    8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9

  • Size

    93KB

  • Sample

    241220-x73z7aslcx

  • MD5

    73c7a3c03ab43cd390c64e04374c43d9

  • SHA1

    661c1d5642647432a69c1471803a007592b16543

  • SHA256

    8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9

  • SHA512

    2cd13500928ce9179b5c8ddec0c5e07713754e8e8665f973e4006a374e210aa30c5bb5763807dc91d22cf89952f4a7ca6eda992ac3bfae684b3cf7754e087b0c

  • SSDEEP

    1536:axGq+8Tnc7iXQj5piFejEwzGi1dDIDngS:axXTnkiXE4Vi1dOg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

20b7dddd28527b3a08b870ea6749495d

Attributes
  • reg_key

    20b7dddd28527b3a08b870ea6749495d

  • splitter

    |'|'|

Targets

    • Target

      8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9

    • Size

      93KB

    • MD5

      73c7a3c03ab43cd390c64e04374c43d9

    • SHA1

      661c1d5642647432a69c1471803a007592b16543

    • SHA256

      8280702dae2acdb7ffe64077ff710b22474109e5adbd0b600f333f3902fd7ff9

    • SHA512

      2cd13500928ce9179b5c8ddec0c5e07713754e8e8665f973e4006a374e210aa30c5bb5763807dc91d22cf89952f4a7ca6eda992ac3bfae684b3cf7754e087b0c

    • SSDEEP

      1536:axGq+8Tnc7iXQj5piFejEwzGi1dDIDngS:axXTnkiXE4Vi1dOg

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks