General

  • Target

    0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee

  • Size

    188KB

  • Sample

    250302-yhmgkssrw6

  • MD5

    7bf85fb4ca2890cbec29eece00ab4dd3

  • SHA1

    98322559eadf493625ecb1c45ee2f88496f3dbcb

  • SHA256

    0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee

  • SHA512

    3ca80df3013ba8eceb60f1e6b70bbcf9a3261652da52b5bc2cfc9248f8ce991a79b9979cf3e050a150fe8e93b3add25ee657eea8c1e5f43658f4ba5e9036b0ad

  • SSDEEP

    3072:BSFKNYHiDg+NwA8eobw9XyPekpL6qwFqkBNjyERBdxD3I:lNgiyAd9XMtxwFqkLjM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

bossik.ddns.net:777

Mutex

5189075cbe03b536e4350cfebaeca464

Attributes
  • reg_key

    5189075cbe03b536e4350cfebaeca464

  • splitter

    |'|'|

Targets

    • Target

      0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee

    • Size

      188KB

    • MD5

      7bf85fb4ca2890cbec29eece00ab4dd3

    • SHA1

      98322559eadf493625ecb1c45ee2f88496f3dbcb

    • SHA256

      0f722c0c9b8b16575fa0a7d5ffc67cc59a07be308669599933c8362d1aca0cee

    • SHA512

      3ca80df3013ba8eceb60f1e6b70bbcf9a3261652da52b5bc2cfc9248f8ce991a79b9979cf3e050a150fe8e93b3add25ee657eea8c1e5f43658f4ba5e9036b0ad

    • SSDEEP

      3072:BSFKNYHiDg+NwA8eobw9XyPekpL6qwFqkBNjyERBdxD3I:lNgiyAd9XMtxwFqkLjM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks