General

  • Target

    ce18f6810aa6baa1136bb395b6609094bf8a9bbae12d41ee593a90cc5d7b48bd.exe

  • Size

    127KB

  • Sample

    250116-fq9yqsvkbk

  • MD5

    851e013c473c1b5ee3ee45ce38891103

  • SHA1

    96537656c88d5dba4ddea3497121c604747c01cb

  • SHA256

    ce18f6810aa6baa1136bb395b6609094bf8a9bbae12d41ee593a90cc5d7b48bd

  • SHA512

    947d0f1b4aac6608c7f5cf030b91b810dd80c2c08b6d5e0552de3a2b61ea614b490ee80609646aaef12826339dc2d494446accce4f2edf5e6b85b5a1810860e6

  • SSDEEP

    3072:0fQK3QLdbSNO4wmR34hP8naoAk3/zWMi0GTGs:0f4L

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

787580e7d36fdf4ee92dc64b27a94f66

Attributes
  • reg_key

    787580e7d36fdf4ee92dc64b27a94f66

  • splitter

    |'|'|

Targets

    • Target

      ce18f6810aa6baa1136bb395b6609094bf8a9bbae12d41ee593a90cc5d7b48bd.exe

    • Size

      127KB

    • MD5

      851e013c473c1b5ee3ee45ce38891103

    • SHA1

      96537656c88d5dba4ddea3497121c604747c01cb

    • SHA256

      ce18f6810aa6baa1136bb395b6609094bf8a9bbae12d41ee593a90cc5d7b48bd

    • SHA512

      947d0f1b4aac6608c7f5cf030b91b810dd80c2c08b6d5e0552de3a2b61ea614b490ee80609646aaef12826339dc2d494446accce4f2edf5e6b85b5a1810860e6

    • SSDEEP

      3072:0fQK3QLdbSNO4wmR34hP8naoAk3/zWMi0GTGs:0f4L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks