General

  • Target

    057d62261912947a1f18f01aa7afd23f.exe

  • Size

    37KB

  • Sample

    220906-x2ncjshhf6

  • MD5

    057d62261912947a1f18f01aa7afd23f

  • SHA1

    31a7eb1006791f6e9ce3f92bf4c6df4cbf2b2a26

  • SHA256

    0633a748ff46014de54f04842b330746f815c669a1f6074e8beaec6b07f51937

  • SHA512

    7393f6d8ee85cc17b8a9bb0cd34c3dc1f81babf3febece1c8125e37b03044455f3081677ee3f5f730195209f8c35cd14e6692892ee36532bc938321b77570939

  • SSDEEP

    384:AkqIiuVjtD+P3V+y0bf2TKtvN4suKfdrAF+rMRTyN/0L+EcoinblneHQM3epzXHz:DNmV10bf2TKtClK1rM+rMRa8Nu5xt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

8.tcp.ngrok.io:10195

Mutex

e5fb6e8df0343904c919e4379c7d6680

Attributes
  • reg_key

    e5fb6e8df0343904c919e4379c7d6680

  • splitter

    |'|'|

Targets

    • Target

      057d62261912947a1f18f01aa7afd23f.exe

    • Size

      37KB

    • MD5

      057d62261912947a1f18f01aa7afd23f

    • SHA1

      31a7eb1006791f6e9ce3f92bf4c6df4cbf2b2a26

    • SHA256

      0633a748ff46014de54f04842b330746f815c669a1f6074e8beaec6b07f51937

    • SHA512

      7393f6d8ee85cc17b8a9bb0cd34c3dc1f81babf3febece1c8125e37b03044455f3081677ee3f5f730195209f8c35cd14e6692892ee36532bc938321b77570939

    • SSDEEP

      384:AkqIiuVjtD+P3V+y0bf2TKtvN4suKfdrAF+rMRTyN/0L+EcoinblneHQM3epzXHz:DNmV10bf2TKtClK1rM+rMRa8Nu5xt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks