General

  • Target

    ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577aexe.exe

  • Size

    37KB

  • Sample

    231207-x23ggaef44

  • MD5

    47e3f3358fbf1ee79fbed6e4f22d28e8

  • SHA1

    1ff51a2a2c9ef6b5c21824f77fd44b262e7e42e1

  • SHA256

    ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577a

  • SHA512

    0b35e8198bc70d9ead4a96fcf9d14a67562216c38855ac7f4f6d23577da874ddf543eccd5ae28180c02063f370c62cf1ad3a4b1a8af89ec720cea68a368aaf48

  • SSDEEP

    384:3QKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzXJ:gKXTZ38f7CTv8FwKrM+rMRa8NuzFt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:16921

Mutex

8be032421617ac901feeb88dde9830e6

Attributes
  • reg_key

    8be032421617ac901feeb88dde9830e6

  • splitter

    |'|'|

Targets

    • Target

      ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577aexe.exe

    • Size

      37KB

    • MD5

      47e3f3358fbf1ee79fbed6e4f22d28e8

    • SHA1

      1ff51a2a2c9ef6b5c21824f77fd44b262e7e42e1

    • SHA256

      ce408e126def4dab38a7a260d4775111b140154cfc5abb1b6a0f397884e0577a

    • SHA512

      0b35e8198bc70d9ead4a96fcf9d14a67562216c38855ac7f4f6d23577da874ddf543eccd5ae28180c02063f370c62cf1ad3a4b1a8af89ec720cea68a368aaf48

    • SSDEEP

      384:3QKvEiTbHvpWNcZ0y8f7CTvvrILkCwE3rAF+rMRTyN/0L+EcoinblneHQM3epzXJ:gKXTZ38f7CTv8FwKrM+rMRa8NuzFt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks