General

  • Target

    8a40b60f37d095570a50f5edf2680d48.exe

  • Size

    31KB

  • Sample

    241016-vddr4avakq

  • MD5

    8a40b60f37d095570a50f5edf2680d48

  • SHA1

    c29668edffbfa0e444ad56fbd5bc71d3aa81281e

  • SHA256

    4c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3

  • SHA512

    4c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686

  • SSDEEP

    768:AjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0ti9Cj:XkKdisvQVkVj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

upss

C2

0.tcp.eu.ngrok.io:14673

Mutex

4f7098563ca32e152a50bf8bea3737b3

Attributes
  • reg_key

    4f7098563ca32e152a50bf8bea3737b3

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      8a40b60f37d095570a50f5edf2680d48.exe

    • Size

      31KB

    • MD5

      8a40b60f37d095570a50f5edf2680d48

    • SHA1

      c29668edffbfa0e444ad56fbd5bc71d3aa81281e

    • SHA256

      4c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3

    • SHA512

      4c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686

    • SSDEEP

      768:AjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0ti9Cj:XkKdisvQVkVj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks