General

  • Target

    80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011.exe

  • Size

    55KB

  • Sample

    241126-pspv1s1nbx

  • MD5

    5d57fd5e4c5fd0f7ee7015f6e86ff64b

  • SHA1

    f57c2ffdba34947c804a33df0800059dc516c8b4

  • SHA256

    80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011

  • SHA512

    40c4a0afae7dc9d48e54df8e27e3687bb4dbd25b9b3f6478937e6cfbc1ea54f652a5bb19a7cec509f6cf83f0397b5105d10a4becd4441f84c0b896b52a9ed39f

  • SSDEEP

    1536:SXJYUmUYaB3Ky8ibpUfR/WViL8cIbJDLtffJ:WYe5EyNbkuVioBd9ffJ

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

1

C2

172.0.0.1:11111

94.131.109.101:11111

Mutex

bea40e08f77dcbe9528c9454b4346452

Attributes
  • reg_key

    bea40e08f77dcbe9528c9454b4346452

  • splitter

    |'|'|

Targets

    • Target

      80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011.exe

    • Size

      55KB

    • MD5

      5d57fd5e4c5fd0f7ee7015f6e86ff64b

    • SHA1

      f57c2ffdba34947c804a33df0800059dc516c8b4

    • SHA256

      80212787b7477e5d6c42781439c54bf42fa430337786db0dec2cb7039c0a1011

    • SHA512

      40c4a0afae7dc9d48e54df8e27e3687bb4dbd25b9b3f6478937e6cfbc1ea54f652a5bb19a7cec509f6cf83f0397b5105d10a4becd4441f84c0b896b52a9ed39f

    • SSDEEP

      1536:SXJYUmUYaB3Ky8ibpUfR/WViL8cIbJDLtffJ:WYe5EyNbkuVioBd9ffJ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks