General

  • Target

    263a3b04d6cc97c62f984c326ffa98ba38b077e06a9c3d4b79d734c34ceb30eeN.exe

  • Size

    55KB

  • Sample

    241126-flcgnsskfl

  • MD5

    505c5271b804039b329f346d550e4590

  • SHA1

    0583bff4aef09b6698e6903118568ade640252d9

  • SHA256

    263a3b04d6cc97c62f984c326ffa98ba38b077e06a9c3d4b79d734c34ceb30ee

  • SHA512

    a6ac8e886dfcae0dea31e83df7c702be23e6c39c2ece4a7da3d31f3c8fbb9aa503df78bd99f28dedde5bedef8185ba498a139dea73dc5cf1b0a1dc4e88cc7daf

  • SSDEEP

    1536:SXJYUmUYaB3Ky8ibpUfR/WViL8cIbJDLtff:WYe5EyNbkuVioBd9ff

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

1

C2

172.0.0.1:11111

94.131.109.101:11111

Mutex

bea40e08f77dcbe9528c9454b4346452

Attributes
  • reg_key

    bea40e08f77dcbe9528c9454b4346452

  • splitter

    |'|'|

Targets

    • Target

      263a3b04d6cc97c62f984c326ffa98ba38b077e06a9c3d4b79d734c34ceb30eeN.exe

    • Size

      55KB

    • MD5

      505c5271b804039b329f346d550e4590

    • SHA1

      0583bff4aef09b6698e6903118568ade640252d9

    • SHA256

      263a3b04d6cc97c62f984c326ffa98ba38b077e06a9c3d4b79d734c34ceb30ee

    • SHA512

      a6ac8e886dfcae0dea31e83df7c702be23e6c39c2ece4a7da3d31f3c8fbb9aa503df78bd99f28dedde5bedef8185ba498a139dea73dc5cf1b0a1dc4e88cc7daf

    • SSDEEP

      1536:SXJYUmUYaB3Ky8ibpUfR/WViL8cIbJDLtff:WYe5EyNbkuVioBd9ff

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks