General

  • Target

    c4f718767fdcc8376f38f1bfd0b502e4e6c3de43df021b488b3f50464a8a8ce8N.exe

  • Size

    23KB

  • Sample

    250120-p4yx3azncr

  • MD5

    80ea2beaed01b8be5cf64157ea28a420

  • SHA1

    675cdba93656fa2276ddec1c183e954265c183da

  • SHA256

    c4f718767fdcc8376f38f1bfd0b502e4e6c3de43df021b488b3f50464a8a8ce8

  • SHA512

    4c0e40476b7431d8fa90cc7a3a8079679f0b4d25e30a1de231869810969b129c9cce5cdcaec073853c7ca79d8c1d7c046d4e8823988d4b58ba105b00364a31c8

  • SSDEEP

    384:coWtkEwn65rgjAsGipk55D16HgXakhbZD0mRvR6JZlbw8hqIusZzZIn:L7O89pErRpcnuJ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.10.1.11:5552

Mutex

7657c14284185fbd3fb108b43c7467ba

Attributes
  • reg_key

    7657c14284185fbd3fb108b43c7467ba

  • splitter

    |'|'|

Targets

    • Target

      c4f718767fdcc8376f38f1bfd0b502e4e6c3de43df021b488b3f50464a8a8ce8N.exe

    • Size

      23KB

    • MD5

      80ea2beaed01b8be5cf64157ea28a420

    • SHA1

      675cdba93656fa2276ddec1c183e954265c183da

    • SHA256

      c4f718767fdcc8376f38f1bfd0b502e4e6c3de43df021b488b3f50464a8a8ce8

    • SHA512

      4c0e40476b7431d8fa90cc7a3a8079679f0b4d25e30a1de231869810969b129c9cce5cdcaec073853c7ca79d8c1d7c046d4e8823988d4b58ba105b00364a31c8

    • SSDEEP

      384:coWtkEwn65rgjAsGipk55D16HgXakhbZD0mRvR6JZlbw8hqIusZzZIn:L7O89pErRpcnuJ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks