General

  • Target

    9af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a.exe

  • Size

    23KB

  • Sample

    250103-eb2s5syjhz

  • MD5

    aa6a3fbb8d78e21710da58d6e7b87f86

  • SHA1

    09c8e4815c16a732d9842ef97fda4e347ad0ee27

  • SHA256

    9af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a

  • SHA512

    724a7d8799acf7680ce0ea65e3902a0650aa9f2c635013d1e86a0dbd2ccba6ece5ab7981c8c71b4510d0cfa5a2e3160a722c2aa584f488e181f5f5cbd9479bb6

  • SSDEEP

    384:6cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZzcr:930py6vhxaRpcnuWC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

89.156.24.108:1738

Mutex

af0aa29f43924811e1101d2b844fbfd3

Attributes
  • reg_key

    af0aa29f43924811e1101d2b844fbfd3

  • splitter

    |'|'|

Targets

    • Target

      9af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a.exe

    • Size

      23KB

    • MD5

      aa6a3fbb8d78e21710da58d6e7b87f86

    • SHA1

      09c8e4815c16a732d9842ef97fda4e347ad0ee27

    • SHA256

      9af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a

    • SHA512

      724a7d8799acf7680ce0ea65e3902a0650aa9f2c635013d1e86a0dbd2ccba6ece5ab7981c8c71b4510d0cfa5a2e3160a722c2aa584f488e181f5f5cbd9479bb6

    • SSDEEP

      384:6cqbCK0l4h7o9SVyDGvENuh46/gJkOmMSW38mRvR6JZlbw8hqIusZzZzcr:930py6vhxaRpcnuWC

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks