General

  • Target

    9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849fN

  • Size

    93KB

  • Sample

    250113-jszsbstlg1

  • MD5

    302cf7032efe524349fa1850ce0661c0

  • SHA1

    9c2ea1f3d82970b7168432536c983fc6dd990b88

  • SHA256

    9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849f

  • SHA512

    bd5c444b332d122aba426b0a96c5d479387b47a676402bc714e2b8ee37495d7be7aec2873c1227c4764fc3d8278d68a8a3461b0bc44ba23b75ca7b68e0ed98af

  • SSDEEP

    768:LY3mUByZnDQMMpAZrGSt6udttXymsahkGJiXxrjEtCdnl2pi1Rz4Rk3lsGdp5gS7:LUUZD3rGWNd7DhkhjEwzGi1dDVD5gS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

0.tcp.eu.ngrok.io:12507

Mutex

fde06e51ba752addef229f6178664e93

Attributes
  • reg_key

    fde06e51ba752addef229f6178664e93

  • splitter

    |'|'|

Targets

    • Target

      9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849fN

    • Size

      93KB

    • MD5

      302cf7032efe524349fa1850ce0661c0

    • SHA1

      9c2ea1f3d82970b7168432536c983fc6dd990b88

    • SHA256

      9decfe095e019e7ffaa267ff01fef96d135459f262d5d6c660304029dd36849f

    • SHA512

      bd5c444b332d122aba426b0a96c5d479387b47a676402bc714e2b8ee37495d7be7aec2873c1227c4764fc3d8278d68a8a3461b0bc44ba23b75ca7b68e0ed98af

    • SSDEEP

      768:LY3mUByZnDQMMpAZrGSt6udttXymsahkGJiXxrjEtCdnl2pi1Rz4Rk3lsGdp5gS7:LUUZD3rGWNd7DhkhjEwzGi1dDVD5gS

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks