General

  • Target

    da5df9ef7d27acf7528a8b6b7cde2a10a31594347a6328affd5e0b219ccb45fbN.exe

  • Size

    29KB

  • Sample

    241231-s2rmraxjdz

  • MD5

    9566e633b2a1ebc6bc652da1bda19760

  • SHA1

    6edad8915c425d0e78552942e22b7a054e790cf1

  • SHA256

    da5df9ef7d27acf7528a8b6b7cde2a10a31594347a6328affd5e0b219ccb45fb

  • SHA512

    fcb6d74261cc879bd5bdce99014457f6342c4ef432bd65741858d12a62e87466ae4879f52e965e570a699091cf2ae11a1c36f1ea57b9f3f945e73ecf176b8345

  • SSDEEP

    384:5PqvANl7TxTD+VF2dbofPauxnaIuXF5Xs4GOmqDwgjrzeo9GBsbh0w4wlAokw9OH:Ou75oa4fu124AqFjXeJBKh0p29SgRe/

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

ام سلمان

C2

127.0.0.1:1177

Mutex

b00bcc1238637f2c38892eba30ad1638

Attributes
  • reg_key

    b00bcc1238637f2c38892eba30ad1638

  • splitter

    |'|'|

Targets

    • Target

      da5df9ef7d27acf7528a8b6b7cde2a10a31594347a6328affd5e0b219ccb45fbN.exe

    • Size

      29KB

    • MD5

      9566e633b2a1ebc6bc652da1bda19760

    • SHA1

      6edad8915c425d0e78552942e22b7a054e790cf1

    • SHA256

      da5df9ef7d27acf7528a8b6b7cde2a10a31594347a6328affd5e0b219ccb45fb

    • SHA512

      fcb6d74261cc879bd5bdce99014457f6342c4ef432bd65741858d12a62e87466ae4879f52e965e570a699091cf2ae11a1c36f1ea57b9f3f945e73ecf176b8345

    • SSDEEP

      384:5PqvANl7TxTD+VF2dbofPauxnaIuXF5Xs4GOmqDwgjrzeo9GBsbh0w4wlAokw9OH:Ou75oa4fu124AqFjXeJBKh0p29SgRe/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks