General

  • Target

    4efef6b7867e96d28b5f0e776f183fba83f3eb21f240186a569b21e110296617N

  • Size

    552KB

  • Sample

    241018-n278aavgmc

  • MD5

    391982de84741e4f4f663370774cda90

  • SHA1

    97719efa9c451da3cfc7c5b4292f541589b92207

  • SHA256

    4efef6b7867e96d28b5f0e776f183fba83f3eb21f240186a569b21e110296617

  • SHA512

    b306eed58e4c0a02bec466029179e76629014d31f6de1fc809ef862609e719eae82a5e698fca43ba948a4df24bf779612c9294775c3941afcc711ff67a4ac2a7

  • SSDEEP

    12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fO:RGk69IS0rw4pP9p416QMaBnRCO

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

OCT

C2

film.royalprop.trade:8109

Mutex

update.exe

Attributes
  • reg_key

    update.exe

  • splitter

    0987

Targets

    • Target

      4efef6b7867e96d28b5f0e776f183fba83f3eb21f240186a569b21e110296617N

    • Size

      552KB

    • MD5

      391982de84741e4f4f663370774cda90

    • SHA1

      97719efa9c451da3cfc7c5b4292f541589b92207

    • SHA256

      4efef6b7867e96d28b5f0e776f183fba83f3eb21f240186a569b21e110296617

    • SHA512

      b306eed58e4c0a02bec466029179e76629014d31f6de1fc809ef862609e719eae82a5e698fca43ba948a4df24bf779612c9294775c3941afcc711ff67a4ac2a7

    • SSDEEP

      12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fO:RGk69IS0rw4pP9p416QMaBnRCO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks