General

  • Target

    d.exe

  • Size

    55KB

  • Sample

    241203-ypb97a1mg1

  • MD5

    54f0aa470da2f129138bbced85bb8d75

  • SHA1

    d6496182d5087d5371daf67c56b044ab23aee10c

  • SHA256

    d00f28b765821f7a58a3ae569c2458d58e94b09bb5ccdaa7d3247b82b338dac2

  • SHA512

    8d3615921872a8c8b93fe42e5eb29085498e69de2231a2bf29970c573d29a80cc8aff2bb80e8f070de29e55121d0207cdc18235bcbfc007d0dee88eb9b7bff11

  • SSDEEP

    1536:lL+YADn2N29XnfuCCtDCwsNMD7XExI3pmfm:QYADnX9XnmrtDCwsNMD7XExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

fucked by kev

C2

activities-consist.gl.at.ply.gg:7878

Mutex

c08d762111c4d0de5d1ea0b19f45ff7e

Attributes
  • reg_key

    c08d762111c4d0de5d1ea0b19f45ff7e

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      d.exe

    • Size

      55KB

    • MD5

      54f0aa470da2f129138bbced85bb8d75

    • SHA1

      d6496182d5087d5371daf67c56b044ab23aee10c

    • SHA256

      d00f28b765821f7a58a3ae569c2458d58e94b09bb5ccdaa7d3247b82b338dac2

    • SHA512

      8d3615921872a8c8b93fe42e5eb29085498e69de2231a2bf29970c573d29a80cc8aff2bb80e8f070de29e55121d0207cdc18235bcbfc007d0dee88eb9b7bff11

    • SSDEEP

      1536:lL+YADn2N29XnfuCCtDCwsNMD7XExI3pmfm:QYADnX9XnmrtDCwsNMD7XExI3pm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks