General

  • Target

    a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c

  • Size

    26KB

  • Sample

    250121-j9rs2svmcn

  • MD5

    5230ab034bd4b7c980a35c06b4080b1a

  • SHA1

    a0c1db997607da4489d20380ee7b3acf03ace7c4

  • SHA256

    a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c

  • SHA512

    e1e11609bb875d6acbb979efd64e7de69b13852e39f3f3b1d95443f2827f9a55d8476a599a1e45cf3e04f21f0ba02a55a16cc64c18392609d4265b292c6a84d9

  • SSDEEP

    384:yLjM2XwBNOaLNOFM/Av2yeCP1BBvMl7AQk93vmhm7UMKmIEecKdbXTzm9bVhcayX:sw220U0Wl7A/vMHTi9bD

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

itsdrvgon1.ddns.net:5552

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c

    • Size

      26KB

    • MD5

      5230ab034bd4b7c980a35c06b4080b1a

    • SHA1

      a0c1db997607da4489d20380ee7b3acf03ace7c4

    • SHA256

      a8013df3e7b4242e09d9eda816623ed6f810c7f8f244a862c09d6642e4dcdb5c

    • SHA512

      e1e11609bb875d6acbb979efd64e7de69b13852e39f3f3b1d95443f2827f9a55d8476a599a1e45cf3e04f21f0ba02a55a16cc64c18392609d4265b292c6a84d9

    • SSDEEP

      384:yLjM2XwBNOaLNOFM/Av2yeCP1BBvMl7AQk93vmhm7UMKmIEecKdbXTzm9bVhcayX:sw220U0Wl7A/vMHTi9bD

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks