General

  • Target

    cfca60135ace947b42f62ac66f22c512.exe

  • Size

    31KB

  • Sample

    220110-kbvygsechj

  • MD5

    cfca60135ace947b42f62ac66f22c512

  • SHA1

    89d5914fa02ed618d4eb4fe4d6a8a601b41ec42b

  • SHA256

    d26cea6912e11e87d9fa8782f69b01d38c4e8d40c9548341629b8281f9aa2ab0

  • SHA512

    9a78a102b2c322ea92034d544357ba0abf0c281959f8af19d7c963e1056e13e10b37112bfac0f9043c631b92b65c6d9595685e7af981892f451dd55b86e257e5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

0.tcp.ngrok.io:18994

Mutex

9b8a3c55ddf9e26fc7191bb2a3876cd8

Attributes
  • reg_key

    9b8a3c55ddf9e26fc7191bb2a3876cd8

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      cfca60135ace947b42f62ac66f22c512.exe

    • Size

      31KB

    • MD5

      cfca60135ace947b42f62ac66f22c512

    • SHA1

      89d5914fa02ed618d4eb4fe4d6a8a601b41ec42b

    • SHA256

      d26cea6912e11e87d9fa8782f69b01d38c4e8d40c9548341629b8281f9aa2ab0

    • SHA512

      9a78a102b2c322ea92034d544357ba0abf0c281959f8af19d7c963e1056e13e10b37112bfac0f9043c631b92b65c6d9595685e7af981892f451dd55b86e257e5

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks