General

  • Target

    crypt.exe

  • Size

    429KB

  • Sample

    240725-l6xk8ssern

  • MD5

    9a10110e8d7923fa949ca8fa7acbb1b5

  • SHA1

    44f57c7d0ec36a8976a63b972fffd61aef6cad08

  • SHA256

    b619df0c66cb723d7c04599303b37bfe04d83dbbf6ff369a32a453e889741195

  • SHA512

    417f0cd5f430be55131fbfd11f203e66069ae57ffb1e618478aed7e758bf5bf8827f58f8cacd7dfea7b660e898422bf7fbe4e9a500b6340bfc9b66dd7448b3fb

  • SSDEEP

    12288:2Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPijgg:2q5TfcdHj4fmbq

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

insurance-helmet.gl.at.ply.gg:31388

Mutex

82104ae3464ef515625a324e803cdcd6

Attributes
  • reg_key

    82104ae3464ef515625a324e803cdcd6

  • splitter

    |'|'|

Targets

    • Target

      crypt.exe

    • Size

      429KB

    • MD5

      9a10110e8d7923fa949ca8fa7acbb1b5

    • SHA1

      44f57c7d0ec36a8976a63b972fffd61aef6cad08

    • SHA256

      b619df0c66cb723d7c04599303b37bfe04d83dbbf6ff369a32a453e889741195

    • SHA512

      417f0cd5f430be55131fbfd11f203e66069ae57ffb1e618478aed7e758bf5bf8827f58f8cacd7dfea7b660e898422bf7fbe4e9a500b6340bfc9b66dd7448b3fb

    • SSDEEP

      12288:2Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPijgg:2q5TfcdHj4fmbq

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks