General

  • Target

    f64f23145d784847afbdddc980e738490a8de3a39e43e8729f7170dac53f85c4b.bat

  • Size

    39KB

  • Sample

    231126-y1evfscc67

  • MD5

    c0eecba3766ab30cd2229c1b4af1f42d

  • SHA1

    0b7b74f8a27164bf15c5a75ce03ec3338c9aca5e

  • SHA256

    f64f23145d784847afbdddc980e738490a8de3a39e43e8729f7170dac53f85c4

  • SHA512

    3e64f29cabf0da164b94e1a64589081737fa9cfce82105e121a2268897b9ce006b5cc288d2b4a9d968fd807a57d184bf1893599cc9d74cc0789b96a95611eb12

  • SSDEEP

    768:3hNkJGOwSD4Y+QuiRhYNx4YSe++Lv2HPK4RODwVbwubZQugcNRZyvcZO:3hNkwOwSD4Y+gRwSTMv2SIOygGNRZyvH

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

6.tcp.eu.ngrok.io:13064

Mutex

5c1b72d17df68b15c25c1a3766ac6b9a

Attributes
  • reg_key

    5c1b72d17df68b15c25c1a3766ac6b9a

  • splitter

    |'|'|

Targets

    • Target

      f64f23145d784847afbdddc980e738490a8de3a39e43e8729f7170dac53f85c4b.bat

    • Size

      39KB

    • MD5

      c0eecba3766ab30cd2229c1b4af1f42d

    • SHA1

      0b7b74f8a27164bf15c5a75ce03ec3338c9aca5e

    • SHA256

      f64f23145d784847afbdddc980e738490a8de3a39e43e8729f7170dac53f85c4

    • SHA512

      3e64f29cabf0da164b94e1a64589081737fa9cfce82105e121a2268897b9ce006b5cc288d2b4a9d968fd807a57d184bf1893599cc9d74cc0789b96a95611eb12

    • SSDEEP

      768:3hNkJGOwSD4Y+QuiRhYNx4YSe++Lv2HPK4RODwVbwubZQugcNRZyvcZO:3hNkwOwSD4Y+gRwSTMv2SIOygGNRZyvH

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks