General

  • Target

    Account bringer.exe

  • Size

    37KB

  • Sample

    241004-z4xp4swhjl

  • MD5

    c89a1f18357d4320c84ffd1e48138a0b

  • SHA1

    3673dd9f0c57bf62f6116d50ffb299a6f5707c49

  • SHA256

    c6b3c5096f0cdc2bad82c22a4580f0a275369ba1e9e7960013fd84ea3d43e332

  • SHA512

    59fe319b714b7754de908584870ad1bf742791f168ffb0cf72b8939a8a1f96ecba4f49b4a07306d85b40033d052eca0676f20834a367e2dc8126b7248d54d925

  • SSDEEP

    384:/6Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eF:CfaC6mNhFz1Yyd4ErM+rMRa8Nuhxt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

boykisser

C2

green-morrison.gl.at.ply.gg:17455

Mutex

d83001e08eed9b05d072435f5ca1e81c

Attributes
  • reg_key

    d83001e08eed9b05d072435f5ca1e81c

  • splitter

    |'|'|

Targets

    • Target

      Account bringer.exe

    • Size

      37KB

    • MD5

      c89a1f18357d4320c84ffd1e48138a0b

    • SHA1

      3673dd9f0c57bf62f6116d50ffb299a6f5707c49

    • SHA256

      c6b3c5096f0cdc2bad82c22a4580f0a275369ba1e9e7960013fd84ea3d43e332

    • SHA512

      59fe319b714b7754de908584870ad1bf742791f168ffb0cf72b8939a8a1f96ecba4f49b4a07306d85b40033d052eca0676f20834a367e2dc8126b7248d54d925

    • SSDEEP

      384:/6Rrkam6i/Cz3xAdjYWaSyFz1YXnC8W4Lt6rAF+rMRTyN/0L+EcoinblneHQM3eF:CfaC6mNhFz1Yyd4ErM+rMRa8Nuhxt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks