General

  • Target

    DC5135AA461E90BCBFB73407ACD326F348505B778D9CB.exe

  • Size

    37KB

  • Sample

    220731-t9ylpshaf4

  • MD5

    b25b97950fa6a2787ded68ff502f83ed

  • SHA1

    dff29eb3973f2eff1c2eb9b0194322c4dce67d7b

  • SHA256

    dc5135aa461e90bcbfb73407acd326f348505b778d9cb7c26eb1c165c0f10256

  • SHA512

    949a9474257857080373e413cf32f26aece73d2991f34d87da6521d4b8068299c3c6e3f65770f7557cb2ff91013314114549996a802386558daff115e8e60f1a

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:17696

Mutex

484eea14a1a847f4be40553ddc98f05f

Attributes
  • reg_key

    484eea14a1a847f4be40553ddc98f05f

  • splitter

    |'|'|

Targets

    • Target

      DC5135AA461E90BCBFB73407ACD326F348505B778D9CB.exe

    • Size

      37KB

    • MD5

      b25b97950fa6a2787ded68ff502f83ed

    • SHA1

      dff29eb3973f2eff1c2eb9b0194322c4dce67d7b

    • SHA256

      dc5135aa461e90bcbfb73407acd326f348505b778d9cb7c26eb1c165c0f10256

    • SHA512

      949a9474257857080373e413cf32f26aece73d2991f34d87da6521d4b8068299c3c6e3f65770f7557cb2ff91013314114549996a802386558daff115e8e60f1a

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks