General

  • Target

    53AC11FF93EF419E0E3EC47721765AA7.exe

  • Size

    269KB

  • Sample

    240224-xmag5sbf34

  • MD5

    53ac11ff93ef419e0e3ec47721765aa7

  • SHA1

    aee50be3cfc64958828d06f1b3f9667cdb1342eb

  • SHA256

    6026f6be5ce849d09770c35610f9ec7b611fcd746f80821bab90ecf0fa3df1ac

  • SHA512

    14a15c1f1c19f0a24ca1778c2fd975df0f6f5f5c6d4b01d6c52e89f55f168b604f5572bb77424d2bfb148e533582e0f499453874ae853005304c0d5487eaf207

  • SSDEEP

    6144:4KaynoiYwb5bvnu/e1rZGcw/q+pI5FSz+cf1LNgJ6:4KayoiY81fuG1kcwS+pI5FSzd5NgJ6

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

2024

C2

127.0.0.1:7077

Mutex

System.exe

Attributes
  • reg_key

    System.exe

  • splitter

    |Ghost|

Targets

    • Target

      53AC11FF93EF419E0E3EC47721765AA7.exe

    • Size

      269KB

    • MD5

      53ac11ff93ef419e0e3ec47721765aa7

    • SHA1

      aee50be3cfc64958828d06f1b3f9667cdb1342eb

    • SHA256

      6026f6be5ce849d09770c35610f9ec7b611fcd746f80821bab90ecf0fa3df1ac

    • SHA512

      14a15c1f1c19f0a24ca1778c2fd975df0f6f5f5c6d4b01d6c52e89f55f168b604f5572bb77424d2bfb148e533582e0f499453874ae853005304c0d5487eaf207

    • SSDEEP

      6144:4KaynoiYwb5bvnu/e1rZGcw/q+pI5FSz+cf1LNgJ6:4KayoiY81fuG1kcwS+pI5FSzd5NgJ6

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks