General

  • Target

    de0d8ccd473794aaf8502f983cf83b5f840a5b3b4c84065ea2d5dd037ebad2a4

  • Size

    23KB

  • Sample

    250326-nvst1sswhv

  • MD5

    220204d3ebce0a94144b3efc54d86339

  • SHA1

    4e9c0f896bd499ac75ea22273960e7b0244316c5

  • SHA256

    de0d8ccd473794aaf8502f983cf83b5f840a5b3b4c84065ea2d5dd037ebad2a4

  • SHA512

    8b8f4b126b03d0a55a9af1590ce7ea250bc91ce5477e7c96834373af712bd958d443642dbcc9b8623b249296122f177a915b2ffb133bfa7380f5cda0efec00d5

  • SSDEEP

    384:WQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZch:B5yBVd7Rpcnuv

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

>_<

C2

hhnnss.ddns.net:5552

Mutex

6e7d69d3654f1ba5f22f7d513581ae9c

Attributes
  • reg_key

    6e7d69d3654f1ba5f22f7d513581ae9c

  • splitter

    |'|'|

Targets

    • Target

      de0d8ccd473794aaf8502f983cf83b5f840a5b3b4c84065ea2d5dd037ebad2a4

    • Size

      23KB

    • MD5

      220204d3ebce0a94144b3efc54d86339

    • SHA1

      4e9c0f896bd499ac75ea22273960e7b0244316c5

    • SHA256

      de0d8ccd473794aaf8502f983cf83b5f840a5b3b4c84065ea2d5dd037ebad2a4

    • SHA512

      8b8f4b126b03d0a55a9af1590ce7ea250bc91ce5477e7c96834373af712bd958d443642dbcc9b8623b249296122f177a915b2ffb133bfa7380f5cda0efec00d5

    • SSDEEP

      384:WQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZch:B5yBVd7Rpcnuv

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks