General

  • Target

    Server.exe

  • Size

    37KB

  • Sample

    241031-br2xasvkew

  • MD5

    2ef7aed002ffeb3bb11459e44c8985b4

  • SHA1

    3e4962d44fe8f156883af03bf3deeac2843c73f6

  • SHA256

    3f8718b194105edc9f367fa1a4155c48fa20526c08acce53ae8456a42355d45b

  • SHA512

    bd100c451a343966dd68550b4aee49271a2452dee399570b7397e7deb17694839bcfe5812d5aa11498337dc1ce4e8fb43d89a95417d424a04f913c30207d45d0

  • SSDEEP

    384:tqETgiG1CPZfursvO6yszi7oPJoTnuTarAF+rMRTyN/0L+EcoinblneHQM3epzX0:sE/5Wpszi7o2TuWrM+rMRa8Nux4t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

147.185.221.20:7771

Mutex

19f90553c0dfe2ce6a1dc4098a6125bc

Attributes
  • reg_key

    19f90553c0dfe2ce6a1dc4098a6125bc

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      37KB

    • MD5

      2ef7aed002ffeb3bb11459e44c8985b4

    • SHA1

      3e4962d44fe8f156883af03bf3deeac2843c73f6

    • SHA256

      3f8718b194105edc9f367fa1a4155c48fa20526c08acce53ae8456a42355d45b

    • SHA512

      bd100c451a343966dd68550b4aee49271a2452dee399570b7397e7deb17694839bcfe5812d5aa11498337dc1ce4e8fb43d89a95417d424a04f913c30207d45d0

    • SSDEEP

      384:tqETgiG1CPZfursvO6yszi7oPJoTnuTarAF+rMRTyN/0L+EcoinblneHQM3epzX0:sE/5Wpszi7o2TuWrM+rMRa8Nux4t

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks