General

  • Target

    New Client.exe

  • Size

    65KB

  • Sample

    241030-twl1raxcme

  • MD5

    adebf8218a6f1e5ace6965a397c58be8

  • SHA1

    92af1426e006b354ac230f88c59eb813c73d9625

  • SHA256

    99603c4aa08d90d8b53a010e07ca12ddbac2c72e1c5896534215d20ae14fbf30

  • SHA512

    3dc12ef879a13f2554d3d422ddc9b73e579fe0927d0a4fea38d2cd457975ab4da12f0519e0bea87c7df096c6cae5b288947aa52470a44a4017884d36f333c3eb

  • SSDEEP

    1536:ifqK4Tm4BoN36t4QviFw1AjHkBnvbKfLteF3nLrB9z3nIaF9bKS9vM:ifqK4C4BoN36t4QviFC8EBnefWl9zYaS

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:36811

Mutex

svhost.exe

Attributes
  • reg_key

    svhost.exe

  • splitter

    |Ghost|

Targets

    • Target

      New Client.exe

    • Size

      65KB

    • MD5

      adebf8218a6f1e5ace6965a397c58be8

    • SHA1

      92af1426e006b354ac230f88c59eb813c73d9625

    • SHA256

      99603c4aa08d90d8b53a010e07ca12ddbac2c72e1c5896534215d20ae14fbf30

    • SHA512

      3dc12ef879a13f2554d3d422ddc9b73e579fe0927d0a4fea38d2cd457975ab4da12f0519e0bea87c7df096c6cae5b288947aa52470a44a4017884d36f333c3eb

    • SSDEEP

      1536:ifqK4Tm4BoN36t4QviFw1AjHkBnvbKfLteF3nLrB9z3nIaF9bKS9vM:ifqK4C4BoN36t4QviFC8EBnefWl9zYaS

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks