General

  • Target

    de0c39695e84c0ebfe3176065e3d52b77ae71b36740399e5db862a1fdddf2f78

  • Size

    29KB

  • Sample

    250301-hs6p7stvhz

  • MD5

    a28f7ed4a631d95f5255ffd2fb8cbb50

  • SHA1

    01ae1fd10f7982e4cb42656ec6d816a66ff07399

  • SHA256

    de0c39695e84c0ebfe3176065e3d52b77ae71b36740399e5db862a1fdddf2f78

  • SHA512

    94d916bf1d452ccfc4458e48f8990c51737f2c00b145555d0045fc1a1f8de19296aacb139c051738d2b651493f104d3dc0527653fa59a212378a95dc83f5551a

  • SSDEEP

    384:y3pQjtl7jBnoKoK3J5J5nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZz0:ys7hoKoGJ7NK4Aq1RehBKh0p29SgRdS

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      de0c39695e84c0ebfe3176065e3d52b77ae71b36740399e5db862a1fdddf2f78

    • Size

      29KB

    • MD5

      a28f7ed4a631d95f5255ffd2fb8cbb50

    • SHA1

      01ae1fd10f7982e4cb42656ec6d816a66ff07399

    • SHA256

      de0c39695e84c0ebfe3176065e3d52b77ae71b36740399e5db862a1fdddf2f78

    • SHA512

      94d916bf1d452ccfc4458e48f8990c51737f2c00b145555d0045fc1a1f8de19296aacb139c051738d2b651493f104d3dc0527653fa59a212378a95dc83f5551a

    • SSDEEP

      384:y3pQjtl7jBnoKoK3J5J5nHK4GumqDAEReIlGBsbh0w4wlAokw9OhgOL1vYRGOZz0:ys7hoKoGJ7NK4Aq1RehBKh0p29SgRdS

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks