General

  • Target

    261fa950b4c97df533bc4796aa61a550N.exe

  • Size

    637KB

  • Sample

    240721-28e2zazckf

  • MD5

    261fa950b4c97df533bc4796aa61a550

  • SHA1

    01cfee05bb16d0d1954f64fc6efe9d7119fa95ef

  • SHA256

    30b3a98a9de83f1d2ff56349bbf2540f722f183bcae34b0e8f0457ebb812e1a0

  • SHA512

    e615ceae8b628fe1ed413de129a2265aa868face333a00ef0fcd52e9828acdd7b20e7f41c73811fcd03c2d4e32d7069e0e812ca94478164fa4ae4569e1739357

  • SSDEEP

    12288:gSsRfziqAi/Gz09UFmZk0te5Vu4yKXK9uMJ/h0CVTORbz9Sf:u4i0sbKa9dVhxORbzY

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Lithium

C2

away-displays.gl.at.ply.gg:26916

Mutex

e8ed37b4d4abcd153af637faf649ff76

Attributes
  • reg_key

    e8ed37b4d4abcd153af637faf649ff76

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      261fa950b4c97df533bc4796aa61a550N.exe

    • Size

      637KB

    • MD5

      261fa950b4c97df533bc4796aa61a550

    • SHA1

      01cfee05bb16d0d1954f64fc6efe9d7119fa95ef

    • SHA256

      30b3a98a9de83f1d2ff56349bbf2540f722f183bcae34b0e8f0457ebb812e1a0

    • SHA512

      e615ceae8b628fe1ed413de129a2265aa868face333a00ef0fcd52e9828acdd7b20e7f41c73811fcd03c2d4e32d7069e0e812ca94478164fa4ae4569e1739357

    • SSDEEP

      12288:gSsRfziqAi/Gz09UFmZk0te5Vu4yKXK9uMJ/h0CVTORbz9Sf:u4i0sbKa9dVhxORbzY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks