General

  • Target

    85e63cb6ed366d4b548bfff49528e6ac

  • Size

    1.4MB

  • Sample

    240201-evgbjsbab5

  • MD5

    85e63cb6ed366d4b548bfff49528e6ac

  • SHA1

    d58aeb222fff4730f194346b793b6e1a2773dba9

  • SHA256

    c2cf11a33909db8e4043e88b0119f099d9360fd1f275f4c5b3f7fd204048815c

  • SHA512

    44f3c62b38e3a88cef16c5f541354bcdad7a528e73df2c8694f2826da9ec8dbdd76e2015bc41ba657f6440581e8ce001eb4fde6a1ad7e14afd5c343adc71a647

  • SSDEEP

    24576:Gk/y1uiGoqf3GKjvYyCzbkI8DOhjrqnXDGX72e6meg:GQy1ubo0GKrhCzbkxSIXDGr2er

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

bixigalixa00s.duckdns.org:1177

Mutex

0835cb7495591383306ffedb0ea7c256

Attributes
  • reg_key

    0835cb7495591383306ffedb0ea7c256

  • splitter

    |'|'|

Targets

    • Target

      85e63cb6ed366d4b548bfff49528e6ac

    • Size

      1.4MB

    • MD5

      85e63cb6ed366d4b548bfff49528e6ac

    • SHA1

      d58aeb222fff4730f194346b793b6e1a2773dba9

    • SHA256

      c2cf11a33909db8e4043e88b0119f099d9360fd1f275f4c5b3f7fd204048815c

    • SHA512

      44f3c62b38e3a88cef16c5f541354bcdad7a528e73df2c8694f2826da9ec8dbdd76e2015bc41ba657f6440581e8ce001eb4fde6a1ad7e14afd5c343adc71a647

    • SSDEEP

      24576:Gk/y1uiGoqf3GKjvYyCzbkI8DOhjrqnXDGX72e6meg:GQy1ubo0GKrhCzbkxSIXDGr2er

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks