General

  • Target

    b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6N

  • Size

    27KB

  • Sample

    241110-cd33waxckh

  • MD5

    22a9eef4f84d844a7a4fc345a2a7f9b0

  • SHA1

    ab456bedb557f7805a025d71071b5d1d6c0c76bf

  • SHA256

    b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6

  • SHA512

    5056b3cebe44d646c92f44b177d6d048df339845cea1d7ed97815df40359ce68a4a5b46c41096cddde249ad917728591e1c7c36f508d26e54a5bc2d46cb0c39e

  • SSDEEP

    384:5LJGZoTmgEJbbwvqWGbPxZh7M9AQk93vmhm7UMKmIEecKdbXTzm9bVhcau6Or6eR:J0Nfwj9A/vMHTi9bD

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

multiple-simpsons.gl.at.ply.gg:3159

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6N

    • Size

      27KB

    • MD5

      22a9eef4f84d844a7a4fc345a2a7f9b0

    • SHA1

      ab456bedb557f7805a025d71071b5d1d6c0c76bf

    • SHA256

      b80e66d22b829d23c8aab126f2f93eae6aaded2ce6599a8e3163a862318869f6

    • SHA512

      5056b3cebe44d646c92f44b177d6d048df339845cea1d7ed97815df40359ce68a4a5b46c41096cddde249ad917728591e1c7c36f508d26e54a5bc2d46cb0c39e

    • SSDEEP

      384:5LJGZoTmgEJbbwvqWGbPxZh7M9AQk93vmhm7UMKmIEecKdbXTzm9bVhcau6Or6eR:J0Nfwj9A/vMHTi9bD

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks