General

  • Target

    071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92

  • Size

    64KB

  • Sample

    250127-x14cdasran

  • MD5

    25e50be90bfd526318a41296bfb5b650

  • SHA1

    9a57776f4110fda99adb8e7e86797d6caf96dc7f

  • SHA256

    071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92

  • SHA512

    c187fb49605ba2c9c4a6ca2c68dc6c263ae26552a2fdf00bc6cd508f01abc8526741171ea6c80aca2c9ed5665c734a7cb21d210e5429801e71773ed20701682e

  • SSDEEP

    1536:3EFRfIIajeMzBdiGN9BbwNLi2bhtbxnCAumX:4RfIIYnbONVv5CAFX

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

41180d06ba79ca0eb6f0d961bf964eef

Attributes
  • reg_key

    41180d06ba79ca0eb6f0d961bf964eef

  • splitter

    |'|'|

Targets

    • Target

      071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92

    • Size

      64KB

    • MD5

      25e50be90bfd526318a41296bfb5b650

    • SHA1

      9a57776f4110fda99adb8e7e86797d6caf96dc7f

    • SHA256

      071fc6ca9b912fc950313655189dba484eea959bf925cabb056de793aab61f92

    • SHA512

      c187fb49605ba2c9c4a6ca2c68dc6c263ae26552a2fdf00bc6cd508f01abc8526741171ea6c80aca2c9ed5665c734a7cb21d210e5429801e71773ed20701682e

    • SSDEEP

      1536:3EFRfIIajeMzBdiGN9BbwNLi2bhtbxnCAumX:4RfIIYnbONVv5CAFX

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks