General

  • Target

    7acc030a18df51108f8720a9225b5fee2059692a6705295756e1acf9bf7608b3.exe

  • Size

    171KB

  • Sample

    250106-3cea8svkgm

  • MD5

    526de47d0231672c30a035e3d1f9c249

  • SHA1

    ecab6e21c8df28efb48ed3ad2359d7611089ef99

  • SHA256

    7acc030a18df51108f8720a9225b5fee2059692a6705295756e1acf9bf7608b3

  • SHA512

    11f6e75df807d2acc886401003a586bb34dde7d2bd43ad4588a85f9aa0e646f420cc4ec828e4475af167e49dfcd3ecd112456b923bc7d3506c60972a208e3248

  • SSDEEP

    3072:ap6SSbb4HPwwPnetLrlyi2ayjrY/etoOOV402owBqRK6ggkCtFT:h4vwmRD+yhBqRK5CX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ZZZAU

C2

desgarrada1.no-ip.org:1177

Mutex

0da05431f6f5ca78981bce022c11b0b7

Attributes
  • reg_key

    0da05431f6f5ca78981bce022c11b0b7

  • splitter

    |'|'|

Targets

    • Target

      7acc030a18df51108f8720a9225b5fee2059692a6705295756e1acf9bf7608b3.exe

    • Size

      171KB

    • MD5

      526de47d0231672c30a035e3d1f9c249

    • SHA1

      ecab6e21c8df28efb48ed3ad2359d7611089ef99

    • SHA256

      7acc030a18df51108f8720a9225b5fee2059692a6705295756e1acf9bf7608b3

    • SHA512

      11f6e75df807d2acc886401003a586bb34dde7d2bd43ad4588a85f9aa0e646f420cc4ec828e4475af167e49dfcd3ecd112456b923bc7d3506c60972a208e3248

    • SSDEEP

      3072:ap6SSbb4HPwwPnetLrlyi2ayjrY/etoOOV402owBqRK6ggkCtFT:h4vwmRD+yhBqRK5CX

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks