General

  • Target

    8ee5901e793a7fd23b84b5c8c3133730f40add0e2723ccd1ea066a72fdc9ad84N.exe

  • Size

    37KB

  • Sample

    241127-xteenswldz

  • MD5

    63646257033a6df3325b6b24e3051680

  • SHA1

    fede036f9204b51561aa302364e87efd62f20fea

  • SHA256

    8ee5901e793a7fd23b84b5c8c3133730f40add0e2723ccd1ea066a72fdc9ad84

  • SHA512

    895e6e24081e370baa3232040f06333fd8bc9437ee8374b415a5dd8b94ccbd84eae5e26c222006a442ff01a46d83e0ecf6263501df2fae2eb6dedfa1612ca028

  • SSDEEP

    384:NIROIiuPjtD+P3V+y0b1gBUtPr2s2Mf/rAF+rMRTyN/0L+EcoinblneHQM3epzXV:iRnmV10b1gBUt6lM3rM+rMRa8Nulbt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

game

C2

6.tcp.eu.ngrok.io:13739

Mutex

86e44710278beb6caa0bbd364fe8064e

Attributes
  • reg_key

    86e44710278beb6caa0bbd364fe8064e

  • splitter

    |'|'|

Targets

    • Target

      8ee5901e793a7fd23b84b5c8c3133730f40add0e2723ccd1ea066a72fdc9ad84N.exe

    • Size

      37KB

    • MD5

      63646257033a6df3325b6b24e3051680

    • SHA1

      fede036f9204b51561aa302364e87efd62f20fea

    • SHA256

      8ee5901e793a7fd23b84b5c8c3133730f40add0e2723ccd1ea066a72fdc9ad84

    • SHA512

      895e6e24081e370baa3232040f06333fd8bc9437ee8374b415a5dd8b94ccbd84eae5e26c222006a442ff01a46d83e0ecf6263501df2fae2eb6dedfa1612ca028

    • SSDEEP

      384:NIROIiuPjtD+P3V+y0b1gBUtPr2s2Mf/rAF+rMRTyN/0L+EcoinblneHQM3epzXV:iRnmV10b1gBUt6lM3rM+rMRa8Nulbt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks