General

  • Target

    3f94663bb37a9344adbcab198cdd0496971d0bd202ac72dbe374e63f21988051.exe

  • Size

    23KB

  • Sample

    250106-3w411awkdp

  • MD5

    7538abe7997da17c2c13a1aac18a386f

  • SHA1

    88a79a6ea451e6031e885420eda68b1e9f33cf67

  • SHA256

    3f94663bb37a9344adbcab198cdd0496971d0bd202ac72dbe374e63f21988051

  • SHA512

    3ea1186ac4fdef53e2e427b78ac410d7298961d45875f7c156c8e1aa1478080cdbdff6e9c864dd9289104d0217345ee9293888711db7785586eec9d5099236d5

  • SSDEEP

    384:ffQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZEW1:fA5yBVd7RpcnuM1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NIGGUH

C2

iamsprey.ddns.net:1605

Mutex

4d50ff0f3a4eb213da8fe301253af367

Attributes
  • reg_key

    4d50ff0f3a4eb213da8fe301253af367

  • splitter

    |'|'|

Targets

    • Target

      3f94663bb37a9344adbcab198cdd0496971d0bd202ac72dbe374e63f21988051.exe

    • Size

      23KB

    • MD5

      7538abe7997da17c2c13a1aac18a386f

    • SHA1

      88a79a6ea451e6031e885420eda68b1e9f33cf67

    • SHA256

      3f94663bb37a9344adbcab198cdd0496971d0bd202ac72dbe374e63f21988051

    • SHA512

      3ea1186ac4fdef53e2e427b78ac410d7298961d45875f7c156c8e1aa1478080cdbdff6e9c864dd9289104d0217345ee9293888711db7785586eec9d5099236d5

    • SSDEEP

      384:ffQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZEW1:fA5yBVd7RpcnuM1

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks