General

  • Target

    9d01e343ac4839d6bc0c2137c7a502ee1412c2a2d596d2684653947321174300.exe

  • Size

    23KB

  • Sample

    241230-1f4zyssnfs

  • MD5

    2cb4f9872c77575624a2e207f259d5c7

  • SHA1

    61530c0230a6a52d3b506b15fcd9a4ccfd238e91

  • SHA256

    9d01e343ac4839d6bc0c2137c7a502ee1412c2a2d596d2684653947321174300

  • SHA512

    da941389a01982e965c606381d84303d7d535fc726f3a416e2de4201e9f98d5629d32b10fef93ebb0168c53c0e97b712ed772346d19b7345f307aeb4f7a64e32

  • SSDEEP

    384:xT2x0W3qZN2ATtRGCfCo9D46BgnqUhL19mRvR6JZlbw8hqIusZzZ9Uud:uh+rdflRpcnuOd

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HaCkEd bY LoKn

C2

customers-edmonton.gl.at.ply.gg:28608

Mutex

5a0e6576524fad771bccf79eb40f7eca

Attributes
  • reg_key

    5a0e6576524fad771bccf79eb40f7eca

  • splitter

    |'|'|

Targets

    • Target

      9d01e343ac4839d6bc0c2137c7a502ee1412c2a2d596d2684653947321174300.exe

    • Size

      23KB

    • MD5

      2cb4f9872c77575624a2e207f259d5c7

    • SHA1

      61530c0230a6a52d3b506b15fcd9a4ccfd238e91

    • SHA256

      9d01e343ac4839d6bc0c2137c7a502ee1412c2a2d596d2684653947321174300

    • SHA512

      da941389a01982e965c606381d84303d7d535fc726f3a416e2de4201e9f98d5629d32b10fef93ebb0168c53c0e97b712ed772346d19b7345f307aeb4f7a64e32

    • SSDEEP

      384:xT2x0W3qZN2ATtRGCfCo9D46BgnqUhL19mRvR6JZlbw8hqIusZzZ9Uud:uh+rdflRpcnuOd

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks