General

  • Target

    bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69

  • Size

    425KB

  • Sample

    240406-cqyzpaha8z

  • MD5

    b9a55c795b8b1ea38fe9a8f4549f2762

  • SHA1

    ad8ba6823cd36261f21527391ff32532ef3cbdb4

  • SHA256

    bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69

  • SHA512

    0ebc3b25ce7855cf0df78d6eb12adf07fc55e881d55d762e74f8638d3f9821e6e90a9daac10c8d71cf49f9ee084ffadd180c6728ab098a35c52755f64c063e01

  • SSDEEP

    12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKz:brl6kD68JmlokQfttqY2Kz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

14 mai generateur xbox

C2

89.94.35.57:1604

Mutex

ef05e501c2e286164abf5fcaa961559f

Attributes
  • reg_key

    ef05e501c2e286164abf5fcaa961559f

  • splitter

    |'|'|

Targets

    • Target

      bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69

    • Size

      425KB

    • MD5

      b9a55c795b8b1ea38fe9a8f4549f2762

    • SHA1

      ad8ba6823cd36261f21527391ff32532ef3cbdb4

    • SHA256

      bd0d8aaf3c8509f3170b3464a4949cf87a936c3fc1e3a16a2665b085a7046a69

    • SHA512

      0ebc3b25ce7855cf0df78d6eb12adf07fc55e881d55d762e74f8638d3f9821e6e90a9daac10c8d71cf49f9ee084ffadd180c6728ab098a35c52755f64c063e01

    • SSDEEP

      12288:WquErHF6xC9D6DmR1J98w4oknqO/CyQftQYqYbLmKz:brl6kD68JmlokQfttqY2Kz

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • UPX dump on OEP (original entry point)

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks