Resubmissions

23-09-2023 06:20

230923-g3294afc74 6

22-09-2023 09:24

230922-ldawrshb83 10

21-09-2023 15:40

230921-s4gwbsha8z 4

19-09-2023 16:03

230919-thpvgscc79 1

19-09-2023 13:37

230919-qw5w3shc6s 10

19-09-2023 13:25

230919-qn8yrsbc63 10

13-09-2023 11:47

230913-nx8m9aeb62 4

12-09-2023 19:11

230912-xv98qshf86 10

12-09-2023 19:03

230912-xqr7cshf46 10

12-09-2023 11:47

230912-nybd5sca41 1

General

  • Target

    https://google.com

  • Sample

    230912-xv98qshf86

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

5.tcp.eu.ngrok.io:19587

Mutex

d8c514f6c639c3b8951aabb752c3344a

Attributes
  • reg_key

    d8c514f6c639c3b8951aabb752c3344a

  • splitter

    |'|'|

Targets

    • Target

      https://google.com

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks