General

  • Target

    b0e6f24c119a66f4b9ce908068d3976a.bin

  • Size

    1.1MB

  • Sample

    240214-dyzrmaff5y

  • MD5

    4e2215060c9e82bb599b9008c1fa5e2a

  • SHA1

    65366d68b6eccf3150c12668ed5d24f27a9aee96

  • SHA256

    5d881a2e792b4fcf87334da329968e8f68f90a12a702fb9679837178d62a2b15

  • SHA512

    1e9453c91aeb2bf52b9bfaa1f1271dcc3c043003205621331ceb78929ce85f41c77c48f14836245c3cfae43e166aa9f3e2d18de8356ba3d8cd3fe339d7e72d42

  • SSDEEP

    24576:GgKGnbYNIRMLmjC+ndVEfsQinc9ZgHfzRUPLSwgf:xvU9Lm++nzenKRUP+d

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

MCVzlom

C2

194.38.20.230:6666

Mutex

9f35c64e8328a96f5f95063ef2b234ce

Attributes
  • reg_key

    9f35c64e8328a96f5f95063ef2b234ce

  • splitter

    |'|'|

Targets

    • Target

      2fa422d5cd19a34ae3e8d01127e95db53e7979fe43b6f1aa12a9cf51f33eb955.exe

    • Size

      1.1MB

    • MD5

      b0e6f24c119a66f4b9ce908068d3976a

    • SHA1

      d021cfc658c963bddb74668a0148cfd5655f06ad

    • SHA256

      2fa422d5cd19a34ae3e8d01127e95db53e7979fe43b6f1aa12a9cf51f33eb955

    • SHA512

      d2ea0acff0cdf669d41b669fc81a5c889b0f17164d183ba32aa67ba93e95b9b90fcdad1ddd88462dbccf1cebb620f37f2c37e0f2f6615a9432dc5096772a5d37

    • SSDEEP

      24576:gfOjaRF0g0tYUt6bSs/6gQynGQfuY88Rq0w:TaRj0C4gvnGQfL8Kq

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks