General

  • Target

    injector.exe

  • Size

    23KB

  • Sample

    241028-g9w2nazpdr

  • MD5

    ff4902f16059a26def102ca9fb3d56b9

  • SHA1

    a35c90684f8b78a7ccc157f3b7baeb1644ccf24c

  • SHA256

    5b73ae2b309d1e3b6fabf3b13ac40bffc98305ed913f82dfa289168349e172f5

  • SHA512

    60b5322d63db2eccffb6607456ec2bd640ad075824f1f0e836d6f7b9b193fb7aa1a438b0ea3c047e6a2051c817a0c6692969b285d1e0613b8878ef7adc2007fc

  • SSDEEP

    384:1c68yCasVKDh3OQyNpsQ1im/VjJs+PyR46vg5J++p57nhmRvR6JZlbw8hqIusZzo:Z873Kt+QesGN/VjZPQRpcnu0s

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Victim Of Ely

C2

ignorelistmicrosoft.hopto.org:1604

Mutex

6893e0ba5de0cb77466c584d3323a32d

Attributes
  • reg_key

    6893e0ba5de0cb77466c584d3323a32d

  • splitter

    |'|'|

Targets

    • Target

      injector.exe

    • Size

      23KB

    • MD5

      ff4902f16059a26def102ca9fb3d56b9

    • SHA1

      a35c90684f8b78a7ccc157f3b7baeb1644ccf24c

    • SHA256

      5b73ae2b309d1e3b6fabf3b13ac40bffc98305ed913f82dfa289168349e172f5

    • SHA512

      60b5322d63db2eccffb6607456ec2bd640ad075824f1f0e836d6f7b9b193fb7aa1a438b0ea3c047e6a2051c817a0c6692969b285d1e0613b8878ef7adc2007fc

    • SSDEEP

      384:1c68yCasVKDh3OQyNpsQ1im/VjJs+PyR46vg5J++p57nhmRvR6JZlbw8hqIusZzo:Z873Kt+QesGN/VjZPQRpcnu0s

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks