General

  • Target

    11651e832cac06016c2b253573e2eabb93d2cc3553e8d58bf3133c09ed44191bN.exe

  • Size

    23KB

  • Sample

    241231-gqmzmsxqcm

  • MD5

    8ff0da747c6d0e9870cb9ce91b951160

  • SHA1

    5c645d5eed1c2fa4ce5e9ba4ecc405915a71c579

  • SHA256

    11651e832cac06016c2b253573e2eabb93d2cc3553e8d58bf3133c09ed44191b

  • SHA512

    9cfa1c4e7089903a37eebdefd4303e283cf2b3b19a185b9ca9128c6d7cda3bb3a83ac82815a64dba002bc198c36598473c62db3f4ce6cca45d9e24d1dd54a1fa

  • SSDEEP

    384:4sqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZpF:vf65K2Yf1jKRpcnuw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.242.103:5552

Mutex

41e37e0e68c4601548177f4056648eeb

Attributes
  • reg_key

    41e37e0e68c4601548177f4056648eeb

  • splitter

    |'|'|

Targets

    • Target

      11651e832cac06016c2b253573e2eabb93d2cc3553e8d58bf3133c09ed44191bN.exe

    • Size

      23KB

    • MD5

      8ff0da747c6d0e9870cb9ce91b951160

    • SHA1

      5c645d5eed1c2fa4ce5e9ba4ecc405915a71c579

    • SHA256

      11651e832cac06016c2b253573e2eabb93d2cc3553e8d58bf3133c09ed44191b

    • SHA512

      9cfa1c4e7089903a37eebdefd4303e283cf2b3b19a185b9ca9128c6d7cda3bb3a83ac82815a64dba002bc198c36598473c62db3f4ce6cca45d9e24d1dd54a1fa

    • SSDEEP

      384:4sqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZpF:vf65K2Yf1jKRpcnuw

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks