General

  • Target

    335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8fN

  • Size

    3.4MB

  • Sample

    241106-qn33hs1cjh

  • MD5

    7519fab11e73a51ddd403bfc9008cff0

  • SHA1

    b1b07a33d54859aaa1e2e6dbc22519051e07e6a9

  • SHA256

    335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8f

  • SHA512

    81bcc890db76771c0a685787da2660fe5f3117bb965c6ad6b3b6d651bcc22b12a9d415efadc918591eee1c3a59905e5479e7e785d94c35890f84122c01df7f1f

  • SSDEEP

    98304:p8Fl84qUQhj3J2CBCoX05otUScs8QKkc7LkCvL:aS4q5jZ2K1WSHCvL

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

comments-interventions.gl.at.ply.gg:43880

Mutex

ebcc26f4de39924d996fb09d34793367

Attributes
  • reg_key

    ebcc26f4de39924d996fb09d34793367

  • splitter

    |'|'|

Targets

    • Target

      335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8fN

    • Size

      3.4MB

    • MD5

      7519fab11e73a51ddd403bfc9008cff0

    • SHA1

      b1b07a33d54859aaa1e2e6dbc22519051e07e6a9

    • SHA256

      335031654ecc1799c90f681ca309b9377d6be0a5561d457cc99ed73e839fbf8f

    • SHA512

      81bcc890db76771c0a685787da2660fe5f3117bb965c6ad6b3b6d651bcc22b12a9d415efadc918591eee1c3a59905e5479e7e785d94c35890f84122c01df7f1f

    • SSDEEP

      98304:p8Fl84qUQhj3J2CBCoX05otUScs8QKkc7LkCvL:aS4q5jZ2K1WSHCvL

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks