General

  • Target

    0b85997e299f9d802ea2fb192dce07eea810a477edcc75c92753fe388cafe6f6.exe

  • Size

    29KB

  • Sample

    241231-ye94gawlbw

  • MD5

    6bd9ae71b80c17bd0490e351ce50cdf0

  • SHA1

    d0d6c408bbc8cdd7b2e599208c0c80f158e8c8bb

  • SHA256

    0b85997e299f9d802ea2fb192dce07eea810a477edcc75c92753fe388cafe6f6

  • SHA512

    93e7ea47d97e93de0b5d5d30149d8a8a738fd1409974a04117847ed19e8a345edbe2f9975d15bb14eeff4c021283386a2db1f2cd15d95ff8c8c52da1ac0243b6

  • SSDEEP

    384:5PqvANl7TxTD+VF2dbofPauxnaIuXF5Xs4GOmqDwgjrzeo9GBsbh0w4wlAokw9ON:Ou75oa4fu124AqFjXeJBKh0p29SgRe/t

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

ام سلمان

C2

127.0.0.1:1177

Mutex

b00bcc1238637f2c38892eba30ad1638

Attributes
  • reg_key

    b00bcc1238637f2c38892eba30ad1638

  • splitter

    |'|'|

Targets

    • Target

      0b85997e299f9d802ea2fb192dce07eea810a477edcc75c92753fe388cafe6f6.exe

    • Size

      29KB

    • MD5

      6bd9ae71b80c17bd0490e351ce50cdf0

    • SHA1

      d0d6c408bbc8cdd7b2e599208c0c80f158e8c8bb

    • SHA256

      0b85997e299f9d802ea2fb192dce07eea810a477edcc75c92753fe388cafe6f6

    • SHA512

      93e7ea47d97e93de0b5d5d30149d8a8a738fd1409974a04117847ed19e8a345edbe2f9975d15bb14eeff4c021283386a2db1f2cd15d95ff8c8c52da1ac0243b6

    • SSDEEP

      384:5PqvANl7TxTD+VF2dbofPauxnaIuXF5Xs4GOmqDwgjrzeo9GBsbh0w4wlAokw9ON:Ou75oa4fu124AqFjXeJBKh0p29SgRe/t

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks