General

  • Target

    24d17b379e1523b35c3e630cf812f9fd7753a3d9970fe00173d19ea38a3b0b50

  • Size

    118KB

  • Sample

    240925-ndcrgawake

  • MD5

    b75263a5ff29306b3c2ef4bcb3d03384

  • SHA1

    e372672a2a4c5a7e4011a9f83fcc78c96fbc5aa5

  • SHA256

    24d17b379e1523b35c3e630cf812f9fd7753a3d9970fe00173d19ea38a3b0b50

  • SHA512

    69cc2c6b21115a355695c6ff0b430629d56385a5b830e5dd4b7ce75e915cebf3cda6f9505cb5f09c9e36bd5f1d89f3b281f4e5d31f9c18565692154576b770f1

  • SSDEEP

    3072:Rj1izz9lteifio7OA6DMppM86VK9oR7MTIdXMO/veG/jOwEI9Y:OPZeJo7f6gppEooR7BMcvedwxY

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

2024

C2

127.0.0.1:7077

Mutex

System.exe

Attributes
  • reg_key

    System.exe

  • splitter

    |Ghost|

Targets

    • Target

      6026f6be5ce849d09770c35610f9ec7b611fcd746f80821bab90ecf0fa3df1ac.exe

    • Size

      269KB

    • MD5

      53ac11ff93ef419e0e3ec47721765aa7

    • SHA1

      aee50be3cfc64958828d06f1b3f9667cdb1342eb

    • SHA256

      6026f6be5ce849d09770c35610f9ec7b611fcd746f80821bab90ecf0fa3df1ac

    • SHA512

      14a15c1f1c19f0a24ca1778c2fd975df0f6f5f5c6d4b01d6c52e89f55f168b604f5572bb77424d2bfb148e533582e0f499453874ae853005304c0d5487eaf207

    • SSDEEP

      6144:4KaynoiYwb5bvnu/e1rZGcw/q+pI5FSz+cf1LNgJ6:4KayoiY81fuG1kcwS+pI5FSzd5NgJ6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks