General

  • Target

    b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62dfN.exe

  • Size

    23KB

  • Sample

    241226-p5qcbawkhs

  • MD5

    fb451379d4a930fa6d32653df80f04c0

  • SHA1

    5b4415ed12c887fa9654e2020a2cbba35caeb2d5

  • SHA256

    b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62df

  • SHA512

    845d2979721f37c3d8c3662b74e0ff018d5230e98c1a53fc76ed49e9f17f7bcfc85184d849e8d4e14f6194662b05bfed49d172f9a72a5859e8fef1a1039f42ed

  • SSDEEP

    384:D8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzW:q1Re/E+WUiW6ci6NR7tZRpcnu/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

problems-onion.gl.at.ply.gg:37334

Mutex

626e4dfbf3e3dd60d6fbf80bed03d249

Attributes
  • reg_key

    626e4dfbf3e3dd60d6fbf80bed03d249

  • splitter

    |'|'|

Targets

    • Target

      b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62dfN.exe

    • Size

      23KB

    • MD5

      fb451379d4a930fa6d32653df80f04c0

    • SHA1

      5b4415ed12c887fa9654e2020a2cbba35caeb2d5

    • SHA256

      b2d090c9279fd27fa992ed729f8aa6311a220358cea1b0f9f72245e2c3ab62df

    • SHA512

      845d2979721f37c3d8c3662b74e0ff018d5230e98c1a53fc76ed49e9f17f7bcfc85184d849e8d4e14f6194662b05bfed49d172f9a72a5859e8fef1a1039f42ed

    • SSDEEP

      384:D8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZzW:q1Re/E+WUiW6ci6NR7tZRpcnu/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks