General

  • Target

    4be94f702c445d29a29d9c6cfd27402912d8e453d7d7c7a47d26b736673896a3

  • Size

    58KB

  • Sample

    241123-x5ybxsskfx

  • MD5

    d851457375df95ee26ca13524e5bbbfb

  • SHA1

    8243d96f85b5290c864ea8b29638d3d4baca4a86

  • SHA256

    4be94f702c445d29a29d9c6cfd27402912d8e453d7d7c7a47d26b736673896a3

  • SHA512

    0ec419e362d8f6f5c9819faa572fc15c24d94a166a3032348ff544cfbd250128bf03fc1fe37764642a3dd1d793ce12331ec193dbd737b1617697c7dd82eae7e9

  • SSDEEP

    1536:y2q3pLscBG2HwE+xSC3RUIHpZMXpB9O+nk:QVDg4wt33H7ypfO+nk

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:7771

Mutex

4c7a09e2b9a3f7aed80289c245122ae5

Attributes
  • reg_key

    4c7a09e2b9a3f7aed80289c245122ae5

  • splitter

    |'|'|

Targets

    • Target

      4be94f702c445d29a29d9c6cfd27402912d8e453d7d7c7a47d26b736673896a3

    • Size

      58KB

    • MD5

      d851457375df95ee26ca13524e5bbbfb

    • SHA1

      8243d96f85b5290c864ea8b29638d3d4baca4a86

    • SHA256

      4be94f702c445d29a29d9c6cfd27402912d8e453d7d7c7a47d26b736673896a3

    • SHA512

      0ec419e362d8f6f5c9819faa572fc15c24d94a166a3032348ff544cfbd250128bf03fc1fe37764642a3dd1d793ce12331ec193dbd737b1617697c7dd82eae7e9

    • SSDEEP

      1536:y2q3pLscBG2HwE+xSC3RUIHpZMXpB9O+nk:QVDg4wt33H7ypfO+nk

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks