General

  • Target

    73daf46555bf51f2b83039ff96dda21b116da8d48c33649dd1e204183fdf85cc

  • Size

    23KB

  • Sample

    250127-3qn3lazkdw

  • MD5

    c3a510cd91731fd86d440e779706cd3f

  • SHA1

    c65977daeca838535873d353e15e155c86151c00

  • SHA256

    73daf46555bf51f2b83039ff96dda21b116da8d48c33649dd1e204183fdf85cc

  • SHA512

    658847bf6b2707f5943ead178196c4fb6114227daa60f3edf71a849455b2afae955c0b57af579fa9267677d3a053f72ad9e7d47727fcfe2d02b1e88c311ec69f

  • SSDEEP

    384:eslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ4x:XeEvwIlLMRpcnuv

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.9:5552

Mutex

ab19a3d99d19ff7ab2e5026a3aaf7e3f

Attributes
  • reg_key

    ab19a3d99d19ff7ab2e5026a3aaf7e3f

  • splitter

    |'|'|

Targets

    • Target

      73daf46555bf51f2b83039ff96dda21b116da8d48c33649dd1e204183fdf85cc

    • Size

      23KB

    • MD5

      c3a510cd91731fd86d440e779706cd3f

    • SHA1

      c65977daeca838535873d353e15e155c86151c00

    • SHA256

      73daf46555bf51f2b83039ff96dda21b116da8d48c33649dd1e204183fdf85cc

    • SHA512

      658847bf6b2707f5943ead178196c4fb6114227daa60f3edf71a849455b2afae955c0b57af579fa9267677d3a053f72ad9e7d47727fcfe2d02b1e88c311ec69f

    • SSDEEP

      384:eslUlEvOEJ8xWwYJOMiOBZEdj1567gtwi5HhbQmRvR6JZlbw8hqIusZzZ4x:XeEvwIlLMRpcnuv

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks