General

  • Target

    2cffc41b15b6a7796cbd3a16bf127323.bin

  • Size

    29KB

  • Sample

    230716-bp5keacb83

  • MD5

    11fcaf739897ee4ffd359149fab4a17f

  • SHA1

    6cb3319464dabe276015b69c60640f78cb3fda1d

  • SHA256

    d8b677d34bcd86962054ad071ec4620bce4fb50ff93ada1be5ab212658002690

  • SHA512

    200266feb533e3f31a79f24f444976dd9055a8afd8017b3b814b2d560d052486d6465aa29aef5a1fd50c35199ddb7bcae237a68b869171c9d69e4e52c43b837a

  • SSDEEP

    768:BsXho28nuqaBkP5q4t5iBHvS4UsgRSx5Yb4rfzUd:2t8u3Bm8noUfYMrfzg

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

7.tcp.eu.ngrok.io:14936

Mutex

ddfa0f7edcf1190a4c394097f851c263

Attributes
  • reg_key

    ddfa0f7edcf1190a4c394097f851c263

  • splitter

    |'|'|

Targets

    • Target

      8ef09a0498e51e4696d77b493deb20b33f8b17ebb02e19586aae97cd458cf5bd.exe

    • Size

      54KB

    • MD5

      2cffc41b15b6a7796cbd3a16bf127323

    • SHA1

      d7433079b25c841ab4e105bbdd57aa90da9b41b7

    • SHA256

      8ef09a0498e51e4696d77b493deb20b33f8b17ebb02e19586aae97cd458cf5bd

    • SHA512

      4bdd0e29a374fd406e9b8abe7a21900b75fd1bab189c52c4112494c69186fbda28750d7bed7281a9e484e3fb1f8e9333c7e51c993a9256cfedb6e820bcdb6607

    • SSDEEP

      768:l+NN9ZMTA3W1cGrM+rMRa8NuKVtntQvKuzkE5nwGc:lSN9u03Wa5+gRJNNySuzkqw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks