General

  • Target

    celex.exe

  • Size

    55KB

  • Sample

    241206-rxelysxqck

  • MD5

    c5c8764f8f11a84f5b2045cee5e4d9f1

  • SHA1

    f7d6a80923a7d4939d6ebb6459a7780187f47bcb

  • SHA256

    ae6331fbfc15c5a63072259b5810df459fad8897c017754d318ffb453fa6b53e

  • SHA512

    8df8fdfe1005203ecafb53c43bfa84560915b62bbe9816da6f95b4e44f44b4bc477617e8a6e271f39541747dad5ef092670c7a14b8cae18cf87867f8e89eaf0d

  • SSDEEP

    1536:nKksDnHNwZ8Cam8LDdwsNMD2XExI3pmzm:tsDn6SKiDdwsNMD2XExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

fucked by kev

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

ba504e39d49d09ba3f0b71067d651692

Attributes
  • reg_key

    ba504e39d49d09ba3f0b71067d651692

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      celex.exe

    • Size

      55KB

    • MD5

      c5c8764f8f11a84f5b2045cee5e4d9f1

    • SHA1

      f7d6a80923a7d4939d6ebb6459a7780187f47bcb

    • SHA256

      ae6331fbfc15c5a63072259b5810df459fad8897c017754d318ffb453fa6b53e

    • SHA512

      8df8fdfe1005203ecafb53c43bfa84560915b62bbe9816da6f95b4e44f44b4bc477617e8a6e271f39541747dad5ef092670c7a14b8cae18cf87867f8e89eaf0d

    • SSDEEP

      1536:nKksDnHNwZ8Cam8LDdwsNMD2XExI3pmzm:tsDn6SKiDdwsNMD2XExI3pm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks