General

  • Target

    2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4

  • Size

    55KB

  • Sample

    241113-zm1qfaslck

  • MD5

    9e2820d95c9c4679ac7e5a59ed6dbbca

  • SHA1

    d0fb293112ed0ca4bd8b47c460b432c83e520fef

  • SHA256

    2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4

  • SHA512

    31d2dd5d16a628a495c55acb7f4c4d191a60ac81326b24ea16524825f1255a3beaeca17bcabb5d400ec5e4345be7732b0e4e8f5d60103f5c2ca55cff635f4694

  • SSDEEP

    768:vOOslSt1ManUk2NvPSmorcr3UwhkSN3mwFvfu0YMDHPs977XJSxI3pmum:vOvgDnqNvPSmtzDWwsNMDEXExI3pmum

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

83aky1z.localto.net:6835

Mutex

3a169f8f6ee6a0910570e1e4b3f5795e

Attributes
  • reg_key

    3a169f8f6ee6a0910570e1e4b3f5795e

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4

    • Size

      55KB

    • MD5

      9e2820d95c9c4679ac7e5a59ed6dbbca

    • SHA1

      d0fb293112ed0ca4bd8b47c460b432c83e520fef

    • SHA256

      2d5b9acf03b463406bfeabb01685234e030574f38b8db5fba35b1b61122e2fc4

    • SHA512

      31d2dd5d16a628a495c55acb7f4c4d191a60ac81326b24ea16524825f1255a3beaeca17bcabb5d400ec5e4345be7732b0e4e8f5d60103f5c2ca55cff635f4694

    • SSDEEP

      768:vOOslSt1ManUk2NvPSmorcr3UwhkSN3mwFvfu0YMDHPs977XJSxI3pmum:vOvgDnqNvPSmtzDWwsNMDEXExI3pmum

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks