General

  • Target

    Server.exe

  • Size

    37KB

  • Sample

    240928-t2xz7syajf

  • MD5

    0c598f2b2f1ae3f98fa4b71bb5e0054e

  • SHA1

    37dff49aab529fca2a2369a363edee32534079ff

  • SHA256

    9414d6a46eb57856af3756f18c6393a2192d1bd83c7ca0d8c99787379e4a3199

  • SHA512

    ee5b91744f487b4003bb140767a8b99e1db96605de6a5026aaab2e71c3e00243a8191efd4dc33f43a5c4f8b17c52397cc4ad76c85b1b66abc56cdf0f2b289aed

  • SSDEEP

    384:xv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXi:t5LHJ7k/G4ObZr6GrM+rMRa8Nu6g9gt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

ضحايا Repo

C2

147.185.221.21:49795

Mutex

f291972a40b718fa583ad65b4ccb4602

Attributes
  • reg_key

    f291972a40b718fa583ad65b4ccb4602

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      37KB

    • MD5

      0c598f2b2f1ae3f98fa4b71bb5e0054e

    • SHA1

      37dff49aab529fca2a2369a363edee32534079ff

    • SHA256

      9414d6a46eb57856af3756f18c6393a2192d1bd83c7ca0d8c99787379e4a3199

    • SHA512

      ee5b91744f487b4003bb140767a8b99e1db96605de6a5026aaab2e71c3e00243a8191efd4dc33f43a5c4f8b17c52397cc4ad76c85b1b66abc56cdf0f2b289aed

    • SSDEEP

      384:xv5Zjj6icFri5Z7JAyk/G4OvhRZea6FwrAF+rMRTyN/0L+EcoinblneHQM3epzXi:t5LHJ7k/G4ObZr6GrM+rMRa8Nu6g9gt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks