General

  • Target

    5e92db6b01a8f8b797da12562e4a75cdf7f98f83b1bb6de99273936a70805872

  • Size

    72KB

  • Sample

    240829-vqdymascmd

  • MD5

    761074a6125e1ddc93e7f2531f7cb49e

  • SHA1

    b11dfee96fb1a65377454ef26cfa0d1813881c60

  • SHA256

    5e92db6b01a8f8b797da12562e4a75cdf7f98f83b1bb6de99273936a70805872

  • SHA512

    8c429287bf6c17c8de9904cc130dd940e5d633097499e40822b1c21bc48044d8b7de7c4d2f9cf1a32ceabab3f16c7a51651e8e0f94bad843bff1066f92cbc90c

  • SSDEEP

    1536:8epAyF7F3f4hyGJqKyOaiD7HO2oSheyBdUHrH8ceqa6g:6y3ineOam7FoShjnw7eqa6g

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

document-speaks.gl.at.ply.gg:17045

Mutex

2193c3c3d723e4f3a83aebfe92c78d12

Attributes
  • reg_key

    2193c3c3d723e4f3a83aebfe92c78d12

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      5e92db6b01a8f8b797da12562e4a75cdf7f98f83b1bb6de99273936a70805872

    • Size

      72KB

    • MD5

      761074a6125e1ddc93e7f2531f7cb49e

    • SHA1

      b11dfee96fb1a65377454ef26cfa0d1813881c60

    • SHA256

      5e92db6b01a8f8b797da12562e4a75cdf7f98f83b1bb6de99273936a70805872

    • SHA512

      8c429287bf6c17c8de9904cc130dd940e5d633097499e40822b1c21bc48044d8b7de7c4d2f9cf1a32ceabab3f16c7a51651e8e0f94bad843bff1066f92cbc90c

    • SSDEEP

      1536:8epAyF7F3f4hyGJqKyOaiD7HO2oSheyBdUHrH8ceqa6g:6y3ineOam7FoShjnw7eqa6g

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks