General

  • Target

    248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6

  • Size

    37KB

  • Sample

    240810-vnh5kayfpk

  • MD5

    cb09a75beae0520f594a08df186d8d1d

  • SHA1

    15f0d56be40b56350c7c91b5afff1ec33616ef26

  • SHA256

    248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6

  • SHA512

    acc50e4dc005e94acc97e1f9fb3929ad8d6956c0d951e487538031c2c5d282f93a6ed70d4bf1b0eacce671489e9675843a49412a4f757107e116aee91cb51e1b

  • SSDEEP

    384:HLyvEiTb7vpWNcwIyKrtaW/1TOOv2UthrAF+rMRTyN/0L+EcoinblneHQM3epzXK:ryjTwjKr8+oOeUXrM+rMRa8NuTct

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

193.32.248.218:443

Mutex

321802fd71ac55feb1ecf54b190e0a8f

Attributes
  • reg_key

    321802fd71ac55feb1ecf54b190e0a8f

  • splitter

    |'|'|

Targets

    • Target

      248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6

    • Size

      37KB

    • MD5

      cb09a75beae0520f594a08df186d8d1d

    • SHA1

      15f0d56be40b56350c7c91b5afff1ec33616ef26

    • SHA256

      248ef28ddf2c7907ebac2c3bdd1d8f79a4f6bfb430ea87cc857d2187b6bfc4d6

    • SHA512

      acc50e4dc005e94acc97e1f9fb3929ad8d6956c0d951e487538031c2c5d282f93a6ed70d4bf1b0eacce671489e9675843a49412a4f757107e116aee91cb51e1b

    • SSDEEP

      384:HLyvEiTb7vpWNcwIyKrtaW/1TOOv2UthrAF+rMRTyN/0L+EcoinblneHQM3epzXK:ryjTwjKr8+oOeUXrM+rMRa8NuTct

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks