General

  • Target

    60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75

  • Size

    65KB

  • Sample

    231125-bbcbpsgc5y

  • MD5

    9fb30e20290e3ce2c4782191ee35fc39

  • SHA1

    f70f7cabeee7878b990e7856e4fc997dd95411f4

  • SHA256

    60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75

  • SHA512

    4fee03b1842ee39bbe50b38f3eac1f0d67ae12655f32230feb75a8feb5aa6f0a036372cb1b4bffd827b4dc15811fff6e93c9d1469f9281638c7eaba6697ac9ed

  • SSDEEP

    1536:6XfHJgVE7iT+gRJNSu31mgjpbQL0+fqap9VEl:6XfpgaQ+yJIu31mgjio+Sap9VEl

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

tcp://0.tcp.eu.ngrok.io:11128

Mutex

e8baa137aca8bc15f090e5154870da83

Attributes
  • reg_key

    e8baa137aca8bc15f090e5154870da83

  • splitter

    |'|'|

Targets

    • Target

      60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75

    • Size

      65KB

    • MD5

      9fb30e20290e3ce2c4782191ee35fc39

    • SHA1

      f70f7cabeee7878b990e7856e4fc997dd95411f4

    • SHA256

      60b632ca43af187e4ae1abe216db878fc7d0af4a1bb5c1d44e497501ecddad75

    • SHA512

      4fee03b1842ee39bbe50b38f3eac1f0d67ae12655f32230feb75a8feb5aa6f0a036372cb1b4bffd827b4dc15811fff6e93c9d1469f9281638c7eaba6697ac9ed

    • SSDEEP

      1536:6XfHJgVE7iT+gRJNSu31mgjpbQL0+fqap9VEl:6XfpgaQ+yJIu31mgjio+Sap9VEl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks