General

  • Target

    2bd2ae5777276bcb8542559bd68493bd7768164c1b2580bc0914086bdc86f4af.exe

  • Size

    32KB

  • Sample

    250120-cmjetswqfr

  • MD5

    42b8b11da21d385c84a49d5022aece77

  • SHA1

    afedf0ac8ab7b4f962b453c32507f12533e5b5cc

  • SHA256

    2bd2ae5777276bcb8542559bd68493bd7768164c1b2580bc0914086bdc86f4af

  • SHA512

    7fddad26d4757f03a21c3de6ce4871379a755c2725c6f12827e43137dca8ae913b9c5b35178c075305abfb711a488214a8240a75a68d68cc7a7eaaa4ab50bb5a

  • SSDEEP

    384:yntgwUw7eX+xsi1hpGONr/ZFPIexKBTUUQ/lD/odg9TduS/EIGsJjwE7UMcrie4m:QxkYhpNDj/RouDuCEIGfRR+f

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Win32

C2

185.223.31.253:5552

Mutex

2788638c602f70a3631bf94d56a4ce1f

Attributes
  • reg_key

    2788638c602f70a3631bf94d56a4ce1f

  • splitter

    |'|'|

Targets

    • Target

      2bd2ae5777276bcb8542559bd68493bd7768164c1b2580bc0914086bdc86f4af.exe

    • Size

      32KB

    • MD5

      42b8b11da21d385c84a49d5022aece77

    • SHA1

      afedf0ac8ab7b4f962b453c32507f12533e5b5cc

    • SHA256

      2bd2ae5777276bcb8542559bd68493bd7768164c1b2580bc0914086bdc86f4af

    • SHA512

      7fddad26d4757f03a21c3de6ce4871379a755c2725c6f12827e43137dca8ae913b9c5b35178c075305abfb711a488214a8240a75a68d68cc7a7eaaa4ab50bb5a

    • SSDEEP

      384:yntgwUw7eX+xsi1hpGONr/ZFPIexKBTUUQ/lD/odg9TduS/EIGsJjwE7UMcrie4m:QxkYhpNDj/RouDuCEIGfRR+f

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks