General

  • Target

    129de086d65beaa64f4789c6f467fcd2.exe

  • Size

    65KB

  • Sample

    241016-yem9psydmh

  • MD5

    129de086d65beaa64f4789c6f467fcd2

  • SHA1

    c4f4b9c9a701dc64522ab7031aaa04bcb4e5f54e

  • SHA256

    00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd

  • SHA512

    7981172ebdf0083ca6ae34734c1993fc1aef667909e1daa08f4c9a236831da83cd73c4f4a9c7745870b430d6200620662797f1f7eba232b4574a06b81553d04b

  • SSDEEP

    1536:tWOeboN36tbQviFw1ScTIBnvbBfLteF3nLrB9z3nWaF9bZS9vM:tWOeboN36tbQviFCtcBnVfWl9zGaF9bN

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

uzbek

C2

127.0.0.1:14005

Mutex

yzbekt.exe

Attributes
  • reg_key

    yzbekt.exe

  • splitter

    |Ghost|

Targets

    • Target

      129de086d65beaa64f4789c6f467fcd2.exe

    • Size

      65KB

    • MD5

      129de086d65beaa64f4789c6f467fcd2

    • SHA1

      c4f4b9c9a701dc64522ab7031aaa04bcb4e5f54e

    • SHA256

      00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd

    • SHA512

      7981172ebdf0083ca6ae34734c1993fc1aef667909e1daa08f4c9a236831da83cd73c4f4a9c7745870b430d6200620662797f1f7eba232b4574a06b81553d04b

    • SSDEEP

      1536:tWOeboN36tbQviFw1ScTIBnvbBfLteF3nLrB9z3nWaF9bZS9vM:tWOeboN36tbQviFCtcBnVfWl9zGaF9bN

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks