General

  • Target

    0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b

  • Size

    289KB

  • Sample

    210922-rhdq4sfebn

  • MD5

    347ff437bff7fd078a6aa65c04620b84

  • SHA1

    4c5f2b093cc9be24b61c4d83502f409b1e757f20

  • SHA256

    0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b

  • SHA512

    deb2dd636fa554879e90763a060a5f66b247fbe49bc18c70bbdae8b298916527651113d7123619feaf09f87004507d0a0cf0bb54499149589f3ea9badf75836d

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Vlad

C2

2.tcp.ngrok.io:18100

Mutex

02970e07dff67a33e67ace6d6dbcc09f

Attributes
  • reg_key

    02970e07dff67a33e67ace6d6dbcc09f

  • splitter

    |'|'|

Targets

    • Target

      0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b

    • Size

      289KB

    • MD5

      347ff437bff7fd078a6aa65c04620b84

    • SHA1

      4c5f2b093cc9be24b61c4d83502f409b1e757f20

    • SHA256

      0a9eeb784f09d322d2a05a74a75bf4233052a66325b14b166d6273563217f41b

    • SHA512

      deb2dd636fa554879e90763a060a5f66b247fbe49bc18c70bbdae8b298916527651113d7123619feaf09f87004507d0a0cf0bb54499149589f3ea9badf75836d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks