General

  • Target

    7d144e1188682f25888c3df5e5891e2c.exe

  • Size

    37KB

  • Sample

    211204-jgeysaddh2

  • MD5

    7d144e1188682f25888c3df5e5891e2c

  • SHA1

    1a291404e2cbb9322d80916bebd71d0703761e31

  • SHA256

    709f5f91598f05591278bf42365daf636148c58f5eb7788958e0f008cea56e76

  • SHA512

    fe89abf316f147b5ce12e90febc85d1c0556b848385e4ab1eec295449cc6b6ad696db6ea76e460dcd9a5fa5cabcfb4c1d9c90bd5f68659086e7d1009af8859f1

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

2469e692684be56202e21f78f64bc45b

Attributes
  • reg_key

    2469e692684be56202e21f78f64bc45b

  • splitter

    |'|'|

Targets

    • Target

      7d144e1188682f25888c3df5e5891e2c.exe

    • Size

      37KB

    • MD5

      7d144e1188682f25888c3df5e5891e2c

    • SHA1

      1a291404e2cbb9322d80916bebd71d0703761e31

    • SHA256

      709f5f91598f05591278bf42365daf636148c58f5eb7788958e0f008cea56e76

    • SHA512

      fe89abf316f147b5ce12e90febc85d1c0556b848385e4ab1eec295449cc6b6ad696db6ea76e460dcd9a5fa5cabcfb4c1d9c90bd5f68659086e7d1009af8859f1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

System Information Discovery

1
T1082

Tasks