General

  • Target

    ab5d169e4e341c46b6555d63f3ed530b9d63bf072d44581b56c37bf896b3ddbdN

  • Size

    552KB

  • Sample

    241105-z1xwpszalk

  • MD5

    0c7d40b626d372d4a11cd4f8a4cb1d60

  • SHA1

    338968dd963bdff857e6a0b49b0a928ee524c881

  • SHA256

    ab5d169e4e341c46b6555d63f3ed530b9d63bf072d44581b56c37bf896b3ddbd

  • SHA512

    f39cae0c20cec5b5c9ef87f59d62eb9a272f25a5cdcf444813c864d9b6fe95fb35cc2219637653ff5a656d54b27a68966f33496555a3fda6f387fc6a6942b5bc

  • SSDEEP

    12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fC:RGk69IS0rw4pP9p416QMaBnRCC

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

OCT

C2

film.royalprop.trade:8109

Mutex

update.exe

Attributes
  • reg_key

    update.exe

  • splitter

    0987

Targets

    • Target

      ab5d169e4e341c46b6555d63f3ed530b9d63bf072d44581b56c37bf896b3ddbdN

    • Size

      552KB

    • MD5

      0c7d40b626d372d4a11cd4f8a4cb1d60

    • SHA1

      338968dd963bdff857e6a0b49b0a928ee524c881

    • SHA256

      ab5d169e4e341c46b6555d63f3ed530b9d63bf072d44581b56c37bf896b3ddbd

    • SHA512

      f39cae0c20cec5b5c9ef87f59d62eb9a272f25a5cdcf444813c864d9b6fe95fb35cc2219637653ff5a656d54b27a68966f33496555a3fda6f387fc6a6942b5bc

    • SSDEEP

      12288:R32kYn9YFZBsws0rwfQpP9p/yFUk6l6X3cWCauQWannR8fC:RGk69IS0rw4pP9p416QMaBnRCC

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks