General

  • Target

    4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3.exe

  • Size

    37KB

  • Sample

    240928-l3dnyszdjj

  • MD5

    4a1a0fa8fed53f3be3b26d4e2f38444b

  • SHA1

    f23d93559345eed220ad8292d43e48d35c203d52

  • SHA256

    4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3

  • SHA512

    e7b7ef9a30424fa3545174e44aeea33e01c583400bb2a6a0eafe38adb9c33e1506ca5d5d2ea22b72796f858545a7702bd5f4f093f13654473ff14457b616d257

  • SSDEEP

    384:mwbsiDlT95hL5YyUvjh/xOi4aaF3ArAF+rMRTyN/0L+EcoinblneHQM3epzXUNr4:F5v5zUvjhDlaRArM+rMRa8NuK2t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

yano.ddns.net:1605

Mutex

e43cca706d59e01c80fe2fae1742de3f

Attributes
  • reg_key

    e43cca706d59e01c80fe2fae1742de3f

  • splitter

    |'|'|

Targets

    • Target

      4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3.exe

    • Size

      37KB

    • MD5

      4a1a0fa8fed53f3be3b26d4e2f38444b

    • SHA1

      f23d93559345eed220ad8292d43e48d35c203d52

    • SHA256

      4c42f6a7027df50fff5e175148e29c9fdcde33a77cde36eee1dd8aa121f1fec3

    • SHA512

      e7b7ef9a30424fa3545174e44aeea33e01c583400bb2a6a0eafe38adb9c33e1506ca5d5d2ea22b72796f858545a7702bd5f4f093f13654473ff14457b616d257

    • SSDEEP

      384:mwbsiDlT95hL5YyUvjh/xOi4aaF3ArAF+rMRTyN/0L+EcoinblneHQM3epzXUNr4:F5v5zUvjhDlaRArM+rMRa8NuK2t

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks