General

  • Target

    NjRat.0.7D.exe

  • Size

    31KB

  • Sample

    250123-gqb75swjgw

  • MD5

    f875e445ea6997f53ccea541f4a1b933

  • SHA1

    3a11a15bf03b5bf8952ece2d02607ee29b551db4

  • SHA256

    efd485fb1bb495564cbaba67e413fb288abdd5dd5309c71b89607db28b0e3682

  • SHA512

    8ded6ab74bf370d656cf6a5725a97c23f30e783c222cd5dd7189050d0ae9f6e92cf2611bee1e63336cda96874a48802d8d3d5855843f329cde7f69da4a2a0974

  • SSDEEP

    768:WnCfqdzNB0zx/6LmzmnAXdvAFQmIDUu0tiYbj:X6KjpAQVkvj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

7.tcp.eu.ngrok.io:19931

Mutex

b9cb5683b4d6c647e4bd6dd4ddfd092f

Attributes
  • reg_key

    b9cb5683b4d6c647e4bd6dd4ddfd092f

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      NjRat.0.7D.exe

    • Size

      31KB

    • MD5

      f875e445ea6997f53ccea541f4a1b933

    • SHA1

      3a11a15bf03b5bf8952ece2d02607ee29b551db4

    • SHA256

      efd485fb1bb495564cbaba67e413fb288abdd5dd5309c71b89607db28b0e3682

    • SHA512

      8ded6ab74bf370d656cf6a5725a97c23f30e783c222cd5dd7189050d0ae9f6e92cf2611bee1e63336cda96874a48802d8d3d5855843f329cde7f69da4a2a0974

    • SSDEEP

      768:WnCfqdzNB0zx/6LmzmnAXdvAFQmIDUu0tiYbj:X6KjpAQVkvj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks