General

  • Target

    NL.exe

  • Size

    93KB

  • Sample

    250115-whm21aznb1

  • MD5

    f0c234db804898229a7e3bdea180f915

  • SHA1

    2c61d230f86552e80bf59e6e21546a8dce6f3452

  • SHA256

    a62ee0552b21391d0e2898786f9ec2473eb21d2e7a69aad9737862835f00f377

  • SHA512

    e438734c8811875e8efbea1d6a4ec153ae01a666274c0d8d0751fda6175df3b8f09058f1d7627cabd7b84d873ec31e2407a414c38ecce0797d2718d67beff900

  • SSDEEP

    768:8Y3UbnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3EsGg:gbxOx6baIa9ROj00ljEwzGi1dDcDCgS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5555

Mutex

181a74d35475c4a2137967893bc3cc88

Attributes
  • reg_key

    181a74d35475c4a2137967893bc3cc88

  • splitter

    |'|'|

Targets

    • Target

      NL.exe

    • Size

      93KB

    • MD5

      f0c234db804898229a7e3bdea180f915

    • SHA1

      2c61d230f86552e80bf59e6e21546a8dce6f3452

    • SHA256

      a62ee0552b21391d0e2898786f9ec2473eb21d2e7a69aad9737862835f00f377

    • SHA512

      e438734c8811875e8efbea1d6a4ec153ae01a666274c0d8d0751fda6175df3b8f09058f1d7627cabd7b84d873ec31e2407a414c38ecce0797d2718d67beff900

    • SSDEEP

      768:8Y3UbnD9O/pBcxYsbae6GIXb9pDX2t9zPL0OXLeuXxrjEtCdnl2pi1Rz4Rk3EsGg:gbxOx6baIa9ROj00ljEwzGi1dDcDCgS

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks