General

  • Target

    fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168N.exe

  • Size

    211KB

  • Sample

    250109-ap998asmfq

  • MD5

    7aea88442536ff42667f4073e3af7320

  • SHA1

    569929fe6d511d8454620ed0c53ece0bcbddd116

  • SHA256

    fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168

  • SHA512

    6f7e3ca91a87fd431f3b5e03fdea7ffcf31ca09ba108d4bb593e90acf76058b07e2c06b1197ebde07ceed4ee3fe0ce03cda55dcf8e43a6936b874282f3bb4993

  • SSDEEP

    3072:K80GK5/RPJTOSE1wIVNLIUFQbu21XxjVepW:KfhRPJaSgNsHbu2rj8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

yasser

C2

yassser.no-ip.org:5552

Mutex

32d2362b7a87fb7b318b9b923d0d0515

Attributes
  • reg_key

    32d2362b7a87fb7b318b9b923d0d0515

  • splitter

    |'|'|

Targets

    • Target

      fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168N.exe

    • Size

      211KB

    • MD5

      7aea88442536ff42667f4073e3af7320

    • SHA1

      569929fe6d511d8454620ed0c53ece0bcbddd116

    • SHA256

      fcc63f6536645fe4faaecc064aae5a0bd0afa1f3370acff4c2f812127e2ef168

    • SHA512

      6f7e3ca91a87fd431f3b5e03fdea7ffcf31ca09ba108d4bb593e90acf76058b07e2c06b1197ebde07ceed4ee3fe0ce03cda55dcf8e43a6936b874282f3bb4993

    • SSDEEP

      3072:K80GK5/RPJTOSE1wIVNLIUFQbu21XxjVepW:KfhRPJaSgNsHbu2rj8

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks