General

  • Target

    4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668

  • Size

    1.9MB

  • Sample

    250120-efd8mszpfm

  • MD5

    e4c2350adc7cb595f67e309d52b2778e

  • SHA1

    08a0784691beeb777d864279612a7237075f94ee

  • SHA256

    4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668

  • SHA512

    8b39225020671ce408deba0b8d0e91dfba51e64552b8b18d9f241f2250ef72769fd55cf2c97047dc3921613d0762a86a93be92f64766b829090c93da795ca8ad

  • SSDEEP

    49152:hd6e6x01stTTAkJ/4p3ZpoWJX+vS6ljM3XyF2:hg1xThKJZpoWJO6UjaCA

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

amr555s.no-ip.org:5554

Mutex

f87a088fbd7c06eef1f5a49864be5208

Attributes
  • reg_key

    f87a088fbd7c06eef1f5a49864be5208

  • splitter

    |'|'|

Targets

    • Target

      4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668

    • Size

      1.9MB

    • MD5

      e4c2350adc7cb595f67e309d52b2778e

    • SHA1

      08a0784691beeb777d864279612a7237075f94ee

    • SHA256

      4f3b59864c18a8d1a8add12e29dfd6293d67c07ecbd0bf9b4ae9e34294bc2668

    • SHA512

      8b39225020671ce408deba0b8d0e91dfba51e64552b8b18d9f241f2250ef72769fd55cf2c97047dc3921613d0762a86a93be92f64766b829090c93da795ca8ad

    • SSDEEP

      49152:hd6e6x01stTTAkJ/4p3ZpoWJX+vS6ljM3XyF2:hg1xThKJZpoWJO6UjaCA

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Smart Binder v2.0 By Th3 Exploiter.exe

    • Size

      23KB

    • MD5

      f836c26e8aae6e2ba4efb47af6cecf4f

    • SHA1

      65d32c3ed9f9f03033efb50fe8275a3643755f79

    • SHA256

      c244ca57170c47a61d79092c13a038477a904a416b492adeb5aabe89d1620c30

    • SHA512

      fa8e33791059323c754589a779b167d21cf515fb786c86a84944cf7fc8784be71842db8ee12953855141d99aab9aa707fbfd972d7229156f73168284dcba8f47

    • SSDEEP

      384:47QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZkb/:485yBVd7Rpcnudb

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      SpyNet.exe

    • Size

      2.0MB

    • MD5

      98de7bcad1ba2caf74007bd97bc2b505

    • SHA1

      8a79d06159a339313b810f23835b8417429dd356

    • SHA256

      e4b3b3e72bd3bf4052a3136cb811ea54923bc2d7807709992e0345743d49ced8

    • SHA512

      ef57cc4f0ad4bf1f54baaf7213bf868c418eebfb0eee3c32ff376b67d5d5337c35a94a1418951d82aae371820ce37eade7cf0a74ce54a4198e18327bd232a35d

    • SSDEEP

      49152:GhwHJZqdp7orGOA0jhE6wSZCTIzY7wXSxQ5E+X6Oftn/Z9s0K:GhwHJZUp7orG90NE6KIM7wXr5EI6OR/7

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks