General

  • Target

    Servers.exe

  • Size

    37KB

  • Sample

    241004-1bxeba1hqb

  • MD5

    5665a0ef3c4a6150e10b869fb59ad941

  • SHA1

    7fa2df340c220f3ecab70ad373110a1c23edadc0

  • SHA256

    4c51c9c2122e58bf806674edddf1c75d752b7b9eb8fce8113a5d35ee503dda96

  • SHA512

    d5733d3547fed591eb3aff392877789a71814681fd98796441a1d587be7b8a5e2bbc199d2a4956706890de4031538a2d33333f0f58424f8e7bda1775f11fb590

  • SSDEEP

    768:bNj8nAwJvtPrbAEgC4OrM+rMRa8NuA4t:bNwAwJ1DUEmR+gRJNH

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

ground-heavily.gl.at.ply.gg:5552

Mutex

3d5ac8ba8f05dd1075b6413d77ad5960

Attributes
  • reg_key

    3d5ac8ba8f05dd1075b6413d77ad5960

  • splitter

    |'|'|

Targets

    • Target

      Servers.exe

    • Size

      37KB

    • MD5

      5665a0ef3c4a6150e10b869fb59ad941

    • SHA1

      7fa2df340c220f3ecab70ad373110a1c23edadc0

    • SHA256

      4c51c9c2122e58bf806674edddf1c75d752b7b9eb8fce8113a5d35ee503dda96

    • SHA512

      d5733d3547fed591eb3aff392877789a71814681fd98796441a1d587be7b8a5e2bbc199d2a4956706890de4031538a2d33333f0f58424f8e7bda1775f11fb590

    • SSDEEP

      768:bNj8nAwJvtPrbAEgC4OrM+rMRa8NuA4t:bNwAwJ1DUEmR+gRJNH

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks