General

  • Target

    3b0609403d6ee560d7a62520c9265fe8b8da99b3c8477e313da31eb6f4bb86a3.exe

  • Size

    37KB

  • Sample

    241127-n1837aslez

  • MD5

    221d8ec128c937aa1461ae23500fc6b5

  • SHA1

    5898c6cbd9e6472080848bb58bc76c85d163a2c8

  • SHA256

    3b0609403d6ee560d7a62520c9265fe8b8da99b3c8477e313da31eb6f4bb86a3

  • SHA512

    c832f1ec97ae92aaa90a4e2e38b3eff1d2d0b21bedd595ca7f34b1569620d867efbaca899eddb45eadd6769858225e1c96d907739846a45ef5decf6cf71bfd3a

  • SSDEEP

    384:NIROIiuPjtD+P3V+y0b1gBUtPr2s2Mf/rAF+rMRTyN/0L+EcoinblneHQM3epzX1:iRnmV10b1gBUt6lM3rM+rMRa8NulbtL

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

game

C2

6.tcp.eu.ngrok.io:13739

Mutex

86e44710278beb6caa0bbd364fe8064e

Attributes
  • reg_key

    86e44710278beb6caa0bbd364fe8064e

  • splitter

    |'|'|

Targets

    • Target

      3b0609403d6ee560d7a62520c9265fe8b8da99b3c8477e313da31eb6f4bb86a3.exe

    • Size

      37KB

    • MD5

      221d8ec128c937aa1461ae23500fc6b5

    • SHA1

      5898c6cbd9e6472080848bb58bc76c85d163a2c8

    • SHA256

      3b0609403d6ee560d7a62520c9265fe8b8da99b3c8477e313da31eb6f4bb86a3

    • SHA512

      c832f1ec97ae92aaa90a4e2e38b3eff1d2d0b21bedd595ca7f34b1569620d867efbaca899eddb45eadd6769858225e1c96d907739846a45ef5decf6cf71bfd3a

    • SSDEEP

      384:NIROIiuPjtD+P3V+y0b1gBUtPr2s2Mf/rAF+rMRTyN/0L+EcoinblneHQM3epzX1:iRnmV10b1gBUt6lM3rM+rMRa8NulbtL

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks