General

  • Target

    faabf2861026cb9f8df23bef5a560f27bc131c9c5876f186c19062dd10f964e7.exe

  • Size

    23KB

  • Sample

    250128-h5986a1pcw

  • MD5

    ae2a0f38b0124fcbb145afd67e7c80a6

  • SHA1

    27c1afd988aa70fc401758870f2671d05b34c9dc

  • SHA256

    faabf2861026cb9f8df23bef5a560f27bc131c9c5876f186c19062dd10f964e7

  • SHA512

    2f052f0af7da5330f9af452bbd2fd19c3a1908e569f6c66315acebf18b25c2245c5369a07957287fdcfa9914add592cb2af14267f95dc08da81e9c986bb6b8fe

  • SSDEEP

    384:aY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZF5Fy:NL2s+tRyRpcnugU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

180.35.168.108:1920

Mutex

992f68be44b96a8497930ac49c005b55

Attributes
  • reg_key

    992f68be44b96a8497930ac49c005b55

  • splitter

    |'|'|

Targets

    • Target

      faabf2861026cb9f8df23bef5a560f27bc131c9c5876f186c19062dd10f964e7.exe

    • Size

      23KB

    • MD5

      ae2a0f38b0124fcbb145afd67e7c80a6

    • SHA1

      27c1afd988aa70fc401758870f2671d05b34c9dc

    • SHA256

      faabf2861026cb9f8df23bef5a560f27bc131c9c5876f186c19062dd10f964e7

    • SHA512

      2f052f0af7da5330f9af452bbd2fd19c3a1908e569f6c66315acebf18b25c2245c5369a07957287fdcfa9914add592cb2af14267f95dc08da81e9c986bb6b8fe

    • SSDEEP

      384:aY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZF5Fy:NL2s+tRyRpcnugU

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks