General

  • Target

    0a2d543011727dddf9b75d7675d3de70N

  • Size

    5.1MB

  • Sample

    240907-xpgdgasapd

  • MD5

    0a2d543011727dddf9b75d7675d3de70

  • SHA1

    b27b6da3908efa55898b3cd1dc770c600ff0b280

  • SHA256

    2ad2a247d15a5b5595db3644cea5c838fb3460d9c7622fbbef912d1e54dc3060

  • SHA512

    75e035f29eb55c80a6262a4c2822273795b81cd876709b270382bb1b8c57b6e60d5152098b2549b27fa624ac22b3f99c008c88b83f8aee3445e0fc844e4085f0

  • SSDEEP

    98304:DQOdMiEsjIexzgpsfL/bR/h2ZGZLqxCrNw1tesWe/sURukuUL4HsZj8:sO5jLJL/blh2ZWiCrNw1tr/jRukucKL

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

User(X)

C2

46.23.144.12:1666

cs1600.ddns.net:1666

Mutex

a9e72fe2262cb71e419427313b65a98f

Attributes
  • reg_key

    a9e72fe2262cb71e419427313b65a98f

  • splitter

    |'|'|

Targets

    • Target

      0a2d543011727dddf9b75d7675d3de70N

    • Size

      5.1MB

    • MD5

      0a2d543011727dddf9b75d7675d3de70

    • SHA1

      b27b6da3908efa55898b3cd1dc770c600ff0b280

    • SHA256

      2ad2a247d15a5b5595db3644cea5c838fb3460d9c7622fbbef912d1e54dc3060

    • SHA512

      75e035f29eb55c80a6262a4c2822273795b81cd876709b270382bb1b8c57b6e60d5152098b2549b27fa624ac22b3f99c008c88b83f8aee3445e0fc844e4085f0

    • SSDEEP

      98304:DQOdMiEsjIexzgpsfL/bR/h2ZGZLqxCrNw1tesWe/sURukuUL4HsZj8:sO5jLJL/blh2ZWiCrNw1tr/jRukucKL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks