General

  • Target

    1960fc0413732cabf1620cd1244d354238bda3d31210feff72570dc825e3c4ed

  • Size

    1.0MB

  • Sample

    220121-2vpz1sccaj

  • MD5

    08d5c4483e2106305bc73d6456455f2e

  • SHA1

    ee5c737012942806df0a834ebd3914bd8bb19702

  • SHA256

    1960fc0413732cabf1620cd1244d354238bda3d31210feff72570dc825e3c4ed

  • SHA512

    1c4dbc3273b617704d78e35c5903c6872bb904249f84ae2de5facd9cf2f365d3a9de9e4eccca6a624e9b922dcf856c052e299485d34df22a097dbbfc4ac6952a

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

ZZZZZZQUARENTINEE

C2

tonystark2025.duckdns.org:4010

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    1234

Targets

    • Target

      1960fc0413732cabf1620cd1244d354238bda3d31210feff72570dc825e3c4ed

    • Size

      1.0MB

    • MD5

      08d5c4483e2106305bc73d6456455f2e

    • SHA1

      ee5c737012942806df0a834ebd3914bd8bb19702

    • SHA256

      1960fc0413732cabf1620cd1244d354238bda3d31210feff72570dc825e3c4ed

    • SHA512

      1c4dbc3273b617704d78e35c5903c6872bb904249f84ae2de5facd9cf2f365d3a9de9e4eccca6a624e9b922dcf856c052e299485d34df22a097dbbfc4ac6952a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks