General

  • Target

    b2374aa89f3dfdb0fda1607ecd1a16ab8c580734177d44ab7f9ffe8768d2c9e2.exe

  • Size

    23KB

  • Sample

    250108-t2seqawjfv

  • MD5

    670df283d4432e31ec6ecad3e045d35d

  • SHA1

    44b092790216472578b0e4c94ddd37e550fa17d5

  • SHA256

    b2374aa89f3dfdb0fda1607ecd1a16ab8c580734177d44ab7f9ffe8768d2c9e2

  • SHA512

    48b0a5fc6284c5a690d5d74a8195d4a799c0a6c5fb8389cc58d5cacf15772ddef338e3e8963dd20cc954d3a0cb22c5a7d6c5fe9b1ec0a15b9499a21d20d8c680

  • SSDEEP

    384:ec6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZMV05:xIU0tw3Rpcnuc5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ALIALITALY

C2

SkypeTcp.no-ip.biz:95

Mutex

a8222704e50eaec7b16bac0b7b54fc4b

Attributes
  • reg_key

    a8222704e50eaec7b16bac0b7b54fc4b

  • splitter

    |'|'|

Targets

    • Target

      b2374aa89f3dfdb0fda1607ecd1a16ab8c580734177d44ab7f9ffe8768d2c9e2.exe

    • Size

      23KB

    • MD5

      670df283d4432e31ec6ecad3e045d35d

    • SHA1

      44b092790216472578b0e4c94ddd37e550fa17d5

    • SHA256

      b2374aa89f3dfdb0fda1607ecd1a16ab8c580734177d44ab7f9ffe8768d2c9e2

    • SHA512

      48b0a5fc6284c5a690d5d74a8195d4a799c0a6c5fb8389cc58d5cacf15772ddef338e3e8963dd20cc954d3a0cb22c5a7d6c5fe9b1ec0a15b9499a21d20d8c680

    • SSDEEP

      384:ec6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZMV05:xIU0tw3Rpcnuc5

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks