General

  • Target

    1da2f65a4c1f57b90fa065ee82287e5b.exe

  • Size

    3.5MB

  • Sample

    221122-bjx85sdh98

  • MD5

    1da2f65a4c1f57b90fa065ee82287e5b

  • SHA1

    18a9fe1baa48490cc36500f0a2cb55da28dc5377

  • SHA256

    e78920978425db126e160c542a0d61172f5805efb238b50e964d523baba1ef14

  • SHA512

    8345643fdcbe74cf90237c7e860ce584d0246c8ddb3a3be726c9ad855db5157ad588ce25d00655ce093a1703d2f1c9067c5344d3543a7cb28459626825a4fe5e

  • SSDEEP

    49152:U/Sok+OKQUADbH8wYpT2IQ5nKIrKwpt0dmCnlg3VdStsQ:Uy7U25XIkVFclg3VdS/

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Hacked

C2

2.tcp.eu.ngrok.io:15410

Mutex

02d0575227ba92022bafdbb39fbaddf2

Attributes
  • reg_key

    02d0575227ba92022bafdbb39fbaddf2

  • splitter

    |'|'|

Targets

    • Target

      1da2f65a4c1f57b90fa065ee82287e5b.exe

    • Size

      3.5MB

    • MD5

      1da2f65a4c1f57b90fa065ee82287e5b

    • SHA1

      18a9fe1baa48490cc36500f0a2cb55da28dc5377

    • SHA256

      e78920978425db126e160c542a0d61172f5805efb238b50e964d523baba1ef14

    • SHA512

      8345643fdcbe74cf90237c7e860ce584d0246c8ddb3a3be726c9ad855db5157ad588ce25d00655ce093a1703d2f1c9067c5344d3543a7cb28459626825a4fe5e

    • SSDEEP

      49152:U/Sok+OKQUADbH8wYpT2IQ5nKIrKwpt0dmCnlg3VdStsQ:Uy7U25XIkVFclg3VdS/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks