General

  • Target

    a21cd16a5faaa5ac61b4aa8cda835451.exe

  • Size

    23KB

  • Sample

    250107-k2qfpatqby

  • MD5

    a21cd16a5faaa5ac61b4aa8cda835451

  • SHA1

    f083f24510d1a33f7a1227b8373d87f971017331

  • SHA256

    d1713e9424b42abbed93b8bac931a31f466348cedbe3d2e46e652a49993aea62

  • SHA512

    bf418dd3f52c34cb84385bf4c1252b350f5a567b78ce9690d287bacdbf291fccda177cac40e13530d3b86841dd8891e8f9cd1bfea9e4a7258cb37858eb787b67

  • SSDEEP

    384:KYmCsw/yJrQ7tRGSQCY1r46JgfCcBjdhmRvR6JZlbw8hqIusZzZhY:d7GktQBRpcnu1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ATIVAR WINDOWS 10

C2

clear-calculators.gl.at.ply.gg:57749

Mutex

a4aceb606a3a78450684efc8d6569205

Attributes
  • reg_key

    a4aceb606a3a78450684efc8d6569205

  • splitter

    |'|'|

Targets

    • Target

      a21cd16a5faaa5ac61b4aa8cda835451.exe

    • Size

      23KB

    • MD5

      a21cd16a5faaa5ac61b4aa8cda835451

    • SHA1

      f083f24510d1a33f7a1227b8373d87f971017331

    • SHA256

      d1713e9424b42abbed93b8bac931a31f466348cedbe3d2e46e652a49993aea62

    • SHA512

      bf418dd3f52c34cb84385bf4c1252b350f5a567b78ce9690d287bacdbf291fccda177cac40e13530d3b86841dd8891e8f9cd1bfea9e4a7258cb37858eb787b67

    • SSDEEP

      384:KYmCsw/yJrQ7tRGSQCY1r46JgfCcBjdhmRvR6JZlbw8hqIusZzZhY:d7GktQBRpcnu1

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks