General

  • Target

    ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12N

  • Size

    135KB

  • Sample

    240917-3wq45s1fqd

  • MD5

    33bf20431181a09f3f1ec1aae1d69da0

  • SHA1

    aa1e9893361614bb82b3a1a8a94a84b8970da674

  • SHA256

    ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12

  • SHA512

    92fd38965c19daefaac896280e861c85652e4e227ad47a860ddc4a2f7c6cd3b489b9020ca38e627b813bc8bf7755c9f1d561490c228914e774aebbcefe46fbd9

  • SSDEEP

    3072:xVq7Ganmup+nXhrn+FuKqCg/DREWU+gZCo5:LSmfnXhT+VqCgdfUvZN5

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

chrome

C2

147.185.221.21:43492

Mutex

408747fd467c7d10dbd55bb8e0781708

Attributes
  • reg_key

    408747fd467c7d10dbd55bb8e0781708

  • splitter

    |'|'|

Targets

    • Target

      ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12N

    • Size

      135KB

    • MD5

      33bf20431181a09f3f1ec1aae1d69da0

    • SHA1

      aa1e9893361614bb82b3a1a8a94a84b8970da674

    • SHA256

      ecbd6b6eb454ce86d7e6ab1ca22f8919f6b595193d2f04e093dcf4c90b8d0d12

    • SHA512

      92fd38965c19daefaac896280e861c85652e4e227ad47a860ddc4a2f7c6cd3b489b9020ca38e627b813bc8bf7755c9f1d561490c228914e774aebbcefe46fbd9

    • SSDEEP

      3072:xVq7Ganmup+nXhrn+FuKqCg/DREWU+gZCo5:LSmfnXhT+VqCgdfUvZN5

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks