General

  • Target

    8a40b60f37d095570a50f5edf2680d48.bin

  • Size

    14KB

  • Sample

    241018-by8nes1frq

  • MD5

    565284b6c3a8af44d7e18544c0ae5918

  • SHA1

    fe0d7ef666be0a4fa17897f6d1b8bb9871c5817e

  • SHA256

    f7bcb2b497f29e8403ab3766cf2f5d1421fb291e9216c69761938772a76368d6

  • SHA512

    61582114958496c02f1ef3875adbd4ead65328e93a6bbe9876649d2e78a9ff0bfbe9917d9563f2433432e80855b553a39702accf93072057b5732240cba6237d

  • SSDEEP

    384:Z32qerczaKsFpskt53IuwDlbp5oo7DKjU4dH:4qercWKsqkteNJjKQ4N

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

upss

C2

0.tcp.eu.ngrok.io:14673

Mutex

4f7098563ca32e152a50bf8bea3737b3

Attributes
  • reg_key

    4f7098563ca32e152a50bf8bea3737b3

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      4c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3.exe

    • Size

      31KB

    • MD5

      8a40b60f37d095570a50f5edf2680d48

    • SHA1

      c29668edffbfa0e444ad56fbd5bc71d3aa81281e

    • SHA256

      4c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3

    • SHA512

      4c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686

    • SSDEEP

      768:AjMXjwpJbb2zxxO56eqvPisfv8yQmIDUu0ti9Cj:XkKdisvQVkVj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks