General

  • Target

    b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383.exe

  • Size

    37KB

  • Sample

    231008-kfvhhsah3x

  • MD5

    d85e69803221016200d9c029d390554f

  • SHA1

    1353f0125de814a9ab073f43ee113548f7b09bc8

  • SHA256

    b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383

  • SHA512

    fa06be7cc9fa6f1ed2580e9530a06f19b0df10a0b97e7af8db279e22333d8c7f08ea7cfb2f7acd4bb09601429eac2767425ad3fb8fe20e0c3086073062461bb8

  • SSDEEP

    384:KcnM6ikLRxdDsyNyyszHQxvDe8mkzWrAF+rMRTyN/0L+EcoinblneHQM3epzXFAI:VnbeyNBszHQxC1kirM+rMRa8NukYt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:18801

Mutex

118f5683ac8ec11fa5ebd063bb65cc3b

Attributes
  • reg_key

    118f5683ac8ec11fa5ebd063bb65cc3b

  • splitter

    |'|'|

Targets

    • Target

      b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383.exe

    • Size

      37KB

    • MD5

      d85e69803221016200d9c029d390554f

    • SHA1

      1353f0125de814a9ab073f43ee113548f7b09bc8

    • SHA256

      b02c3cc8be9da55c745c60521c8dc3d2c0a1494cfc8127b6785b58496a779383

    • SHA512

      fa06be7cc9fa6f1ed2580e9530a06f19b0df10a0b97e7af8db279e22333d8c7f08ea7cfb2f7acd4bb09601429eac2767425ad3fb8fe20e0c3086073062461bb8

    • SSDEEP

      384:KcnM6ikLRxdDsyNyyszHQxvDe8mkzWrAF+rMRTyN/0L+EcoinblneHQM3epzXFAI:VnbeyNBszHQxC1kirM+rMRa8NukYt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks