General

  • Target

    3eb8c476c0abcd01fdb799de83503e12.bin

  • Size

    148KB

  • Sample

    240430-bg8xvsgb8v

  • MD5

    4c147a28f95a31b4fb811a1f27fdeddf

  • SHA1

    cd5ab9d8cd433907061718e62dc42bb85c030a63

  • SHA256

    1eebfaa3d4a78af444093bf5e6287445a992b02a522ca12d5d9672ec88204048

  • SHA512

    492a363722562baa6b30e447b9896e6a5321e26e035acf890932195a341e09bc2a6b63bb0f5cd3e8ffdaa22ffd0ecfe3fdb80227fd9dd376d79dcf8114f391ed

  • SSDEEP

    3072:W8rQAlrFqVXx1UVOhNhSxyqj5mcxAEyo2X117LwzA0arnilgKt1Z:WjAuhm1wo2Xf7Lws0Qi2S1Z

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MyBot

C2

asero23.ddns.net:5552

Mutex

863290bfb622fdfe0ad4e1b97536ae62

Attributes
  • reg_key

    863290bfb622fdfe0ad4e1b97536ae62

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986.exe

    • Size

      158KB

    • MD5

      3eb8c476c0abcd01fdb799de83503e12

    • SHA1

      138aa012bb3b20a79aaf016af172a1b3106a7304

    • SHA256

      554f40d4d4e6d80d96c5fc1b41afb7268a0b09b375adc3bcb1e10b1ff2eed986

    • SHA512

      ed277e52d5348d1401a51f002e9f03bfada6481b2cab827f13fa39d54f5c42d4e4ac6627ced47f98fbc22010b044fb0d09b55c6133fc2746e9e78234975c2f85

    • SSDEEP

      3072:tf/J2ULiTehI8FrkZTFieSzoSUYSziUP0ZMJG:32UL2i9FKFHd4SziUP0

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks