General

  • Target

    c36053ad92f2655500d2105b00967617cf9ee90356b905a8377a186273117f97N.exe

  • Size

    117KB

  • Sample

    250122-ahvaesymgr

  • MD5

    b689a019b75e19b2a16a6bab417d24e0

  • SHA1

    3605d3a0257f804d23d9eaca3f2bdf109661997d

  • SHA256

    c36053ad92f2655500d2105b00967617cf9ee90356b905a8377a186273117f97

  • SHA512

    a3b3b624d08dbc091f64f7106a32d9f2486ba47de4b36391522a4e56b307af46b856b96bf4ede8bbad3a1f503ba1f6190ca0f3e6c92d9cb27d67921610f2c46a

  • SSDEEP

    1536:Tl+qMz7zRwM73ifqkWThNgktlw9C2hBjsVbR1YLOl+qMz7zRwM7:Tb8iYHkyNgzC2vLOb8iY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sunplus

C2

arabick.duckdns.org:3329

Mutex

4a5906bc047587dfba7c89a4d5cd271a

Attributes
  • reg_key

    4a5906bc047587dfba7c89a4d5cd271a

  • splitter

    |'|'|

Targets

    • Target

      c36053ad92f2655500d2105b00967617cf9ee90356b905a8377a186273117f97N.exe

    • Size

      117KB

    • MD5

      b689a019b75e19b2a16a6bab417d24e0

    • SHA1

      3605d3a0257f804d23d9eaca3f2bdf109661997d

    • SHA256

      c36053ad92f2655500d2105b00967617cf9ee90356b905a8377a186273117f97

    • SHA512

      a3b3b624d08dbc091f64f7106a32d9f2486ba47de4b36391522a4e56b307af46b856b96bf4ede8bbad3a1f503ba1f6190ca0f3e6c92d9cb27d67921610f2c46a

    • SSDEEP

      1536:Tl+qMz7zRwM73ifqkWThNgktlw9C2hBjsVbR1YLOl+qMz7zRwM7:Tb8iYHkyNgzC2vLOb8iY

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks