General

  • Target

    35b85fa3d704f84a318b4fd3c79fd5e0de4d13a166ae2950878066651c02e412

  • Size

    37KB

  • Sample

    240928-bwtrgsscmc

  • MD5

    7bb7d53306c6f5fdd2ce65ef1d2f7dbb

  • SHA1

    90028422f4d3ef115c30040ec06bd127e99bbfbd

  • SHA256

    35b85fa3d704f84a318b4fd3c79fd5e0de4d13a166ae2950878066651c02e412

  • SHA512

    6d6fca12927c0426ffc5c5f62d368448b62bc2787cdf93bba6dcc2566f474b5b7b21c3c99dad1b8c4431292a515f0f6c41ce74cc1f38d6af1f6fd7c199296556

  • SSDEEP

    384:PJucP97LsikX9zNf/1uyU7/I3/9sWA7zrAF+rMRTyN/0L+EcoinblneHQM3epzXR:rPlil1lU7/I1dAnrM+rMRa8Nuskt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

ouss.freedynamicdns.net:1998

Mutex

906b0c82e2fdcdc83089be513c894263

Attributes
  • reg_key

    906b0c82e2fdcdc83089be513c894263

  • splitter

    |'|'|

Targets

    • Target

      35b85fa3d704f84a318b4fd3c79fd5e0de4d13a166ae2950878066651c02e412

    • Size

      37KB

    • MD5

      7bb7d53306c6f5fdd2ce65ef1d2f7dbb

    • SHA1

      90028422f4d3ef115c30040ec06bd127e99bbfbd

    • SHA256

      35b85fa3d704f84a318b4fd3c79fd5e0de4d13a166ae2950878066651c02e412

    • SHA512

      6d6fca12927c0426ffc5c5f62d368448b62bc2787cdf93bba6dcc2566f474b5b7b21c3c99dad1b8c4431292a515f0f6c41ce74cc1f38d6af1f6fd7c199296556

    • SSDEEP

      384:PJucP97LsikX9zNf/1uyU7/I3/9sWA7zrAF+rMRTyN/0L+EcoinblneHQM3epzXR:rPlil1lU7/I1dAnrM+rMRa8Nuskt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks