General

  • Target

    847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488_JC.exe

  • Size

    37KB

  • Sample

    230815-s7bhqabe83

  • MD5

    858dbea161dd4074ec9a9fefc2aed7d4

  • SHA1

    6f39ba23961d661200c94c3e65bc8b856c2980ab

  • SHA256

    847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488

  • SHA512

    cc7f7fc544896e8b66cb3b5ae728dc6a9815d05634777e28a1ea9838bee24d23028d907ae4102fabf6a50826a74dba3fe99f41693650cd3a400913e15949c76f

  • SSDEEP

    384:PlQZCiT9SLHHGhlbJcycPXvQJKUPDYwSo55rAF+rMRTyN/0L+EcoinblneHQM3e5:NIJrJ/cPXoKUU1oTrM+rMRa8NuxD8tQ

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

11221

C2

147.50.253.218:1234

Mutex

519b55464950ce55b68715cb59bcfbfb

Attributes
  • reg_key

    519b55464950ce55b68715cb59bcfbfb

  • splitter

    |'|'|

Targets

    • Target

      847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488_JC.exe

    • Size

      37KB

    • MD5

      858dbea161dd4074ec9a9fefc2aed7d4

    • SHA1

      6f39ba23961d661200c94c3e65bc8b856c2980ab

    • SHA256

      847f9f041806776e957a60cda7cb58b332583e151eda78e431f4abd82bf7a488

    • SHA512

      cc7f7fc544896e8b66cb3b5ae728dc6a9815d05634777e28a1ea9838bee24d23028d907ae4102fabf6a50826a74dba3fe99f41693650cd3a400913e15949c76f

    • SSDEEP

      384:PlQZCiT9SLHHGhlbJcycPXvQJKUPDYwSo55rAF+rMRTyN/0L+EcoinblneHQM3e5:NIJrJ/cPXoKUU1oTrM+rMRa8NuxD8tQ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks