General

  • Target

    503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89N

  • Size

    37KB

  • Sample

    240921-fec5mawalh

  • MD5

    c2d69bc64ca834ade114523d31af0b20

  • SHA1

    7579b9a2e45e5b0f99113b118981064007874e5b

  • SHA256

    503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89

  • SHA512

    39b31ffe0d68ea682908ed74dcd8ee699219d174aafec10fc086a01bdf6f9c09e7a43044d5a711504d28f289ac0344b0b4c1a6a47a3e0fb988d01cabb4e1acc3

  • SSDEEP

    384:gQmn6ikNRxdDsyNyyszdSZPhs8mGz0rAF+rMRTyN/0L+EcoinblneHQM3epzXIEV:nm0eyNBszdSZC1GwrM+rMRa8Nu+Eft

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

flowers-novelty.gl.at.ply.gg:50375

Mutex

5658a3c4e97b27740dd9826a509bb4c2

Attributes
  • reg_key

    5658a3c4e97b27740dd9826a509bb4c2

  • splitter

    |'|'|

Targets

    • Target

      503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89N

    • Size

      37KB

    • MD5

      c2d69bc64ca834ade114523d31af0b20

    • SHA1

      7579b9a2e45e5b0f99113b118981064007874e5b

    • SHA256

      503e5a4ea65d4b9a8b0ab762cc46a6d8c0f8ba1001373e6c7dc8a299d66dac89

    • SHA512

      39b31ffe0d68ea682908ed74dcd8ee699219d174aafec10fc086a01bdf6f9c09e7a43044d5a711504d28f289ac0344b0b4c1a6a47a3e0fb988d01cabb4e1acc3

    • SSDEEP

      384:gQmn6ikNRxdDsyNyyszdSZPhs8mGz0rAF+rMRTyN/0L+EcoinblneHQM3epzXIEV:nm0eyNBszdSZC1GwrM+rMRa8Nu+Eft

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks