General

  • Target

    169ff58ac1f636b63d23921c7d2350199986f1531eccadb1d4e25f49a1f717e7

  • Size

    55KB

  • Sample

    250118-2h2s2sxqdr

  • MD5

    4ab66e867b6a05a9b1e5d75818806465

  • SHA1

    9fdf3e8b08955afe8730021eed5f0ceb0bda2519

  • SHA256

    169ff58ac1f636b63d23921c7d2350199986f1531eccadb1d4e25f49a1f717e7

  • SHA512

    60007050546b9bd78852356874ec4a0bb76f0ae113b51561388c3d8cd231a4884963021ee1184814bac06ccf6de25aad57dd63ed3b40868ed7e203dafd387c7c

  • SSDEEP

    1536:tpWNMDncNi9y6iRD8wsNMDoXExI3pmUm:aNMDn9ULRD8wsNMDoXExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

homekoen.uswin.com.tr:6522

Mutex

37f66a733fc61cd0155428145d3e2f4a

Attributes
  • reg_key

    37f66a733fc61cd0155428145d3e2f4a

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      169ff58ac1f636b63d23921c7d2350199986f1531eccadb1d4e25f49a1f717e7

    • Size

      55KB

    • MD5

      4ab66e867b6a05a9b1e5d75818806465

    • SHA1

      9fdf3e8b08955afe8730021eed5f0ceb0bda2519

    • SHA256

      169ff58ac1f636b63d23921c7d2350199986f1531eccadb1d4e25f49a1f717e7

    • SHA512

      60007050546b9bd78852356874ec4a0bb76f0ae113b51561388c3d8cd231a4884963021ee1184814bac06ccf6de25aad57dd63ed3b40868ed7e203dafd387c7c

    • SSDEEP

      1536:tpWNMDncNi9y6iRD8wsNMDoXExI3pmUm:aNMDn9ULRD8wsNMDoXExI3pm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks