General

  • Target

    a7c7bb532823a6e7d4ace596f146c618.exe

  • Size

    113KB

  • Sample

    210908-t4s42aaack

  • MD5

    a7c7bb532823a6e7d4ace596f146c618

  • SHA1

    d4ce3acc8b40a6880e5c57c9ec5844643413e312

  • SHA256

    64d7d58724fe40787f7fdcb2496f96206c538fb80c14fc8827f4e5af9a5c99c8

  • SHA512

    51f14f96d6935f336fd224319b1706f9a6d21251c568292574d564b28741ebae8647cb0fca737073ac763e3bd61a0c751538255671c542859d733494a0a566d9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Run RunPE

Attributes
  • splitter

    |'|'|

Targets

    • Target

      a7c7bb532823a6e7d4ace596f146c618.exe

    • Size

      113KB

    • MD5

      a7c7bb532823a6e7d4ace596f146c618

    • SHA1

      d4ce3acc8b40a6880e5c57c9ec5844643413e312

    • SHA256

      64d7d58724fe40787f7fdcb2496f96206c538fb80c14fc8827f4e5af9a5c99c8

    • SHA512

      51f14f96d6935f336fd224319b1706f9a6d21251c568292574d564b28741ebae8647cb0fca737073ac763e3bd61a0c751538255671c542859d733494a0a566d9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks