General

  • Target

    BootstrapperV1.32.exe

  • Size

    55KB

  • Sample

    241006-s87mjssbnk

  • MD5

    a789f36018dc8f90b31f5a4bada5f06e

  • SHA1

    9055844946a5d8f0e28f2c4166e4a7ee37b78abd

  • SHA256

    81193651af092ef7f9382122950f1fc62366019f3ee30cd3c8b1e547859d767e

  • SHA512

    853ae72e8f3fdb103c98e6b8cb1e8b96ece313491ab7f2db386238e2f88c690ce2848c57c212fa7bd1c65a52ca5bcee8c89d33c6608211e50c2afdb6dc79ad8d

  • SSDEEP

    1536:yxYADn8fLN2/SbxRDD3wsNMDbXExI3pm6m:VADnccqbTDD3wsNMDbXExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

veletroblox

C2

tm6bqni.localto.net:5846

Mutex

d54b8b335e1de961884f3956c1c39c50

Attributes
  • reg_key

    d54b8b335e1de961884f3956c1c39c50

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      BootstrapperV1.32.exe

    • Size

      55KB

    • MD5

      a789f36018dc8f90b31f5a4bada5f06e

    • SHA1

      9055844946a5d8f0e28f2c4166e4a7ee37b78abd

    • SHA256

      81193651af092ef7f9382122950f1fc62366019f3ee30cd3c8b1e547859d767e

    • SHA512

      853ae72e8f3fdb103c98e6b8cb1e8b96ece313491ab7f2db386238e2f88c690ce2848c57c212fa7bd1c65a52ca5bcee8c89d33c6608211e50c2afdb6dc79ad8d

    • SSDEEP

      1536:yxYADn8fLN2/SbxRDD3wsNMDbXExI3pm6m:VADnccqbTDD3wsNMDbXExI3pm

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Stops running service(s)

    • Deletes itself

    • Drops startup file

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks