General

  • Target

    129de086d65beaa64f4789c6f467fcd2.bin

  • Size

    30KB

  • Sample

    241018-bddbsazcpq

  • MD5

    aed04194be3fb11a522547a6c802bdf8

  • SHA1

    c539fc84512fd7e5789d0319711c2c680632b9e7

  • SHA256

    64cbfa9edeeb04e80888fa54b2f963dcb7511e8f178ff98e9a9ade9a92b38306

  • SHA512

    c511df9957759fe0f612e22dad241ede0ffd072a9543211aef9095359fc15072840b604c382561931ac1222a8d64ec26c8dfb0efb88c5ab4c2f40c20285872ab

  • SSDEEP

    768:IabAGbvmMTA378HMagjlRUaVKpPUrvKDNuXM:Is3TAr8sagomKWGDr

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

uzbek

C2

127.0.0.1:14005

Mutex

yzbekt.exe

Attributes
  • reg_key

    yzbekt.exe

  • splitter

    |Ghost|

Targets

    • Target

      00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd.exe

    • Size

      65KB

    • MD5

      129de086d65beaa64f4789c6f467fcd2

    • SHA1

      c4f4b9c9a701dc64522ab7031aaa04bcb4e5f54e

    • SHA256

      00d1f7f784455f77516c396b46d234d64a2cfa8f70bab5f1a9f8bcd97aa502fd

    • SHA512

      7981172ebdf0083ca6ae34734c1993fc1aef667909e1daa08f4c9a236831da83cd73c4f4a9c7745870b430d6200620662797f1f7eba232b4574a06b81553d04b

    • SSDEEP

      1536:tWOeboN36tbQviFw1ScTIBnvbBfLteF3nLrB9z3nWaF9bZS9vM:tWOeboN36tbQviFCtcBnVfWl9zGaF9bN

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks