General

  • Target

    5669e32b0b364d4576716c0e516966599447fcb5494d3361d13f241dcffe21b3N.exe

  • Size

    23KB

  • Sample

    250104-dhy56azpcj

  • MD5

    6c6e8736a2cbaa7896ef92b28bc657f0

  • SHA1

    3bedf6cf7a0ff2f8f2b3b6ba001898d4d3aa8078

  • SHA256

    5669e32b0b364d4576716c0e516966599447fcb5494d3361d13f241dcffe21b3

  • SHA512

    b845fdce52c95d67093a2500928e2f725b3fbdb6bd5fc704964fd4c542d635ad92264424c7fe7e05c9f3669795beef62c810872a959cad1e6ec426d09568d162

  • SSDEEP

    384:moWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZC6:Z7O89p2rRpcnum

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

rudghks.ddns.net:2396

Mutex

2524e925ffa79acc0b289930a97c6212

Attributes
  • reg_key

    2524e925ffa79acc0b289930a97c6212

  • splitter

    |'|'|

Targets

    • Target

      5669e32b0b364d4576716c0e516966599447fcb5494d3361d13f241dcffe21b3N.exe

    • Size

      23KB

    • MD5

      6c6e8736a2cbaa7896ef92b28bc657f0

    • SHA1

      3bedf6cf7a0ff2f8f2b3b6ba001898d4d3aa8078

    • SHA256

      5669e32b0b364d4576716c0e516966599447fcb5494d3361d13f241dcffe21b3

    • SHA512

      b845fdce52c95d67093a2500928e2f725b3fbdb6bd5fc704964fd4c542d635ad92264424c7fe7e05c9f3669795beef62c810872a959cad1e6ec426d09568d162

    • SSDEEP

      384:moWtkEwn65rgjAsGipk55D16xgXakhbZD0mRvR6JZlbw8hqIusZzZC6:Z7O89p2rRpcnum

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks