General

  • Target

    30926cfc6268af745dc7d42cb3e87267c277e991436f0bd8a57240a30e200f2d.exe

  • Size

    48KB

  • Sample

    250108-clcwnazjfs

  • MD5

    72a42a680749ea5fc0536b0d6e56ed6c

  • SHA1

    9e2200d3bc217eb828fb164a37ea681be7eb4190

  • SHA256

    30926cfc6268af745dc7d42cb3e87267c277e991436f0bd8a57240a30e200f2d

  • SHA512

    83da1cbe7775c576fc40fa0afa280e9fe8257231bb7b7cadf4898297fd994e163aa25bb739c70e5e863b288022704e021a06d55812b5beed6e9afc6dc89004f8

  • SSDEEP

    384:2oWtkEwn65rgjAsGipk55D16xgXakhbZDQmRvR6JZlbw8hqIusZzZnJWX:p7O89p23RpcnuAIX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sms

C2

jastn.ddns.net:5552

Mutex

00b54a1bb83d059baff531d63f3c66a3

Attributes
  • reg_key

    00b54a1bb83d059baff531d63f3c66a3

  • splitter

    |'|'|

Targets

    • Target

      30926cfc6268af745dc7d42cb3e87267c277e991436f0bd8a57240a30e200f2d.exe

    • Size

      48KB

    • MD5

      72a42a680749ea5fc0536b0d6e56ed6c

    • SHA1

      9e2200d3bc217eb828fb164a37ea681be7eb4190

    • SHA256

      30926cfc6268af745dc7d42cb3e87267c277e991436f0bd8a57240a30e200f2d

    • SHA512

      83da1cbe7775c576fc40fa0afa280e9fe8257231bb7b7cadf4898297fd994e163aa25bb739c70e5e863b288022704e021a06d55812b5beed6e9afc6dc89004f8

    • SSDEEP

      384:2oWtkEwn65rgjAsGipk55D16xgXakhbZDQmRvR6JZlbw8hqIusZzZnJWX:p7O89p23RpcnuAIX

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks