General

  • Target

    161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83

  • Size

    2.1MB

  • Sample

    220628-rk5ydabff3

  • MD5

    55f1a187f2dd21001affdae1ed5267ca

  • SHA1

    bbe87d68e6503f3fd7a908ce40206ba929ce06df

  • SHA256

    161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83

  • SHA512

    574a3aae17fd809db483a2586957df2b284ee691cfe45bd3b0c494e879d2b9280b70b0e61527d9f0031c645b18308b2c657759a7aa990198ae1ce6441f8885a0

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

httpss.ddns.net:1555

Mutex

5ff1382bbd98dd9fcc9977e69f6e285f

Attributes
  • reg_key

    5ff1382bbd98dd9fcc9977e69f6e285f

  • splitter

    |'|'|

Targets

    • Target

      161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83

    • Size

      2.1MB

    • MD5

      55f1a187f2dd21001affdae1ed5267ca

    • SHA1

      bbe87d68e6503f3fd7a908ce40206ba929ce06df

    • SHA256

      161173e2ec7c7e3f3e0adae6e5958a849e42f7588d27e641da9865256a0a4b83

    • SHA512

      574a3aae17fd809db483a2586957df2b284ee691cfe45bd3b0c494e879d2b9280b70b0e61527d9f0031c645b18308b2c657759a7aa990198ae1ce6441f8885a0

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Async RAT payload

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks