General

  • Target

    464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe.exe

  • Size

    3.3MB

  • Sample

    241008-bx8l2awekc

  • MD5

    b2adbe5ec5bba599a6de1525757d4305

  • SHA1

    fda30246566cedc7cc7117169155ee3a1b69af7f

  • SHA256

    464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe

  • SHA512

    4e6b2d4bb094f4c500f00bda294a28800debb6573c2115b4eb61e2b6b4abca94854f448913dfbdc666fe6724c01cb237b9e5522a79054ddbc9d2c02da1dc0a88

  • SSDEEP

    98304:MchV+2Z/m9D2D08Iw3QgT+l4NNEfUOq+O3XMifOYje:Xd/m9r8IstNEcOq+OM2OYje

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

HacKed

C2

still-obviously.gl.at.ply.gg:46857

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe.exe

    • Size

      3.3MB

    • MD5

      b2adbe5ec5bba599a6de1525757d4305

    • SHA1

      fda30246566cedc7cc7117169155ee3a1b69af7f

    • SHA256

      464b61cfe1782dd93d35992994a69b6bf2b51c6adf31e2e9c2e9684dd29fddbe

    • SHA512

      4e6b2d4bb094f4c500f00bda294a28800debb6573c2115b4eb61e2b6b4abca94854f448913dfbdc666fe6724c01cb237b9e5522a79054ddbc9d2c02da1dc0a88

    • SSDEEP

      98304:MchV+2Z/m9D2D08Iw3QgT+l4NNEfUOq+O3XMifOYje:Xd/m9r8IstNEcOq+OM2OYje

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks