General

  • Target

    5d6ab44634ffea26e78d0fd9e8d0c1c2.exe

  • Size

    37KB

  • Sample

    220930-x2m2safear

  • MD5

    5d6ab44634ffea26e78d0fd9e8d0c1c2

  • SHA1

    fd7b612bdb276f986aef915dd0b88ae0901d8eec

  • SHA256

    198e657d4bb70f2f0a068ec656d91789d1cd3d503cf501be28828f42f3de9585

  • SHA512

    aae72933b0b1ded5d9985bbda92c2e3ad608b25bd4b587bcc1f04a3fd6e29a5323c358b7b79d517c9fd7f7c85ae16f555c8981fcbffb865af921f1042041b4f8

  • SSDEEP

    384:wyOMUiDHblmJEpRGyEfBffXNKCYyEAnrAF+rMRTyN/0L+EcoinblneHQM3epzXi:tOqHpR9EfBfVKClEOrM+rMRa8Nu8At

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:17872

Mutex

6f09e9bd4d46a02277608d17d43fb05b

Attributes
  • reg_key

    6f09e9bd4d46a02277608d17d43fb05b

  • splitter

    |'|'|

Targets

    • Target

      5d6ab44634ffea26e78d0fd9e8d0c1c2.exe

    • Size

      37KB

    • MD5

      5d6ab44634ffea26e78d0fd9e8d0c1c2

    • SHA1

      fd7b612bdb276f986aef915dd0b88ae0901d8eec

    • SHA256

      198e657d4bb70f2f0a068ec656d91789d1cd3d503cf501be28828f42f3de9585

    • SHA512

      aae72933b0b1ded5d9985bbda92c2e3ad608b25bd4b587bcc1f04a3fd6e29a5323c358b7b79d517c9fd7f7c85ae16f555c8981fcbffb865af921f1042041b4f8

    • SSDEEP

      384:wyOMUiDHblmJEpRGyEfBffXNKCYyEAnrAF+rMRTyN/0L+EcoinblneHQM3epzXi:tOqHpR9EfBfVKClEOrM+rMRa8Nu8At

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks