General

  • Target

    6dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9.exe

  • Size

    31KB

  • Sample

    250116-dc52hsxrfx

  • MD5

    14caad7ca134fecc2f7a410c00d04bab

  • SHA1

    c9561c1ce6d69d66c211e74de945bee7e72b2fd7

  • SHA256

    6dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9

  • SHA512

    2f08c1d119cc955e282525311bc7125429be0c27ea799d44acadb3f31cb238012e2930826b6ec5805d365c965032839f87419038d98ad58517d53189317dfa92

  • SSDEEP

    768:iMMv+ZW1nRNAzx7SnI1OfoFLhvi0QmIDUu0ti5wqj:9MS2a9RLQVkYvj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

GITHUB

C2

188.64.170.190:1488

Mutex

603620ea0fe398ac1d9cd08d637e8563

Attributes
  • reg_key

    603620ea0fe398ac1d9cd08d637e8563

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      6dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9.exe

    • Size

      31KB

    • MD5

      14caad7ca134fecc2f7a410c00d04bab

    • SHA1

      c9561c1ce6d69d66c211e74de945bee7e72b2fd7

    • SHA256

      6dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9

    • SHA512

      2f08c1d119cc955e282525311bc7125429be0c27ea799d44acadb3f31cb238012e2930826b6ec5805d365c965032839f87419038d98ad58517d53189317dfa92

    • SSDEEP

      768:iMMv+ZW1nRNAzx7SnI1OfoFLhvi0QmIDUu0ti5wqj:9MS2a9RLQVkYvj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks