General

  • Target

    27bf2da773a6f1347f6fd21148bd4f6758435aec96949ca757de6364f820cb55.exe

  • Size

    23KB

  • Sample

    250108-yq4qtstlgp

  • MD5

    7ce1e0c82f3df9048a81d728d4a42ff8

  • SHA1

    864d60fd6239142d3dc2b3bb3dfd5d9be9613c7b

  • SHA256

    27bf2da773a6f1347f6fd21148bd4f6758435aec96949ca757de6364f820cb55

  • SHA512

    97de814876d831c8ad5e4d165d298add37ce101deabcca9ba46c182cfe37bdb41b46dd0e7dda35b65e7f8c8bc3137da892e2f461cdc95d71667cb73ab5460818

  • SSDEEP

    384:ec6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZMV0J:xIU0tw3RpcnucJ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ALIALITALY

C2

SkypeTcp.no-ip.biz:95

Mutex

a8222704e50eaec7b16bac0b7b54fc4b

Attributes
  • reg_key

    a8222704e50eaec7b16bac0b7b54fc4b

  • splitter

    |'|'|

Targets

    • Target

      27bf2da773a6f1347f6fd21148bd4f6758435aec96949ca757de6364f820cb55.exe

    • Size

      23KB

    • MD5

      7ce1e0c82f3df9048a81d728d4a42ff8

    • SHA1

      864d60fd6239142d3dc2b3bb3dfd5d9be9613c7b

    • SHA256

      27bf2da773a6f1347f6fd21148bd4f6758435aec96949ca757de6364f820cb55

    • SHA512

      97de814876d831c8ad5e4d165d298add37ce101deabcca9ba46c182cfe37bdb41b46dd0e7dda35b65e7f8c8bc3137da892e2f461cdc95d71667cb73ab5460818

    • SSDEEP

      384:ec6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZMV0J:xIU0tw3RpcnucJ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks