General

  • Target

    41f512f233557a55f2bd1e92f6fdd3e43375317201789640c0fdc6ea3dd39d7b.exe

  • Size

    29KB

  • Sample

    250225-c7a9ysykt8

  • MD5

    ba9bc4dbe33ace6dac7b89d103c4ba6a

  • SHA1

    c19f5251c82a6172d02e25b675c498a3dc31f8b1

  • SHA256

    41f512f233557a55f2bd1e92f6fdd3e43375317201789640c0fdc6ea3dd39d7b

  • SHA512

    e4d37daf96f7de65beaa330129830ca15a0bae0e0afe74b6618fec36bd873ba7f8142765f9503323aba546c8a4c59d398f082675f931ca578e7805bc9c0039e0

  • SSDEEP

    768:FQv/27NYsDkfZPoIqlHepBKh0p29SgRCwD:Om7N143wEKhG29jCwD

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

kaher.no-ip.biz:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      41f512f233557a55f2bd1e92f6fdd3e43375317201789640c0fdc6ea3dd39d7b.exe

    • Size

      29KB

    • MD5

      ba9bc4dbe33ace6dac7b89d103c4ba6a

    • SHA1

      c19f5251c82a6172d02e25b675c498a3dc31f8b1

    • SHA256

      41f512f233557a55f2bd1e92f6fdd3e43375317201789640c0fdc6ea3dd39d7b

    • SHA512

      e4d37daf96f7de65beaa330129830ca15a0bae0e0afe74b6618fec36bd873ba7f8142765f9503323aba546c8a4c59d398f082675f931ca578e7805bc9c0039e0

    • SSDEEP

      768:FQv/27NYsDkfZPoIqlHepBKh0p29SgRCwD:Om7N143wEKhG29jCwD

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks