General

  • Target

    06282cdd7fa54ea991fba55a50f8d8bd.exe

  • Size

    85KB

  • Sample

    241206-yd39jatmev

  • MD5

    06282cdd7fa54ea991fba55a50f8d8bd

  • SHA1

    ba2cc621ce142888e001221b881f18dfdf971d16

  • SHA256

    5adacfc1a38f978177f6aa03d8e95e584d75e2cd614aa88a686678f50ec4e0d4

  • SHA512

    2a0fc3c07392ec03dbbb9b23910fec809266d185c73cbf02dc3fbfca5033d1218eb5be576a3852888afbf5a882b9df6d185d3c4a7394bcc113d584600b60f1d1

  • SSDEEP

    1536:NX1CKfcCqx+gRJNfxKGU4Q+GhjOwxLfUP0k6rM5cpGPaOK5e:NX4KEp+yJZxKGlYSwxLu0kc5sPe5e

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

hacked

C2

2.tcp.eu.ngrok.io:19294

Mutex

08e0b826461df6aaa32a19d4d44ad609

Attributes
  • reg_key

    08e0b826461df6aaa32a19d4d44ad609

  • splitter

    |'|'|

Targets

    • Target

      06282cdd7fa54ea991fba55a50f8d8bd.exe

    • Size

      85KB

    • MD5

      06282cdd7fa54ea991fba55a50f8d8bd

    • SHA1

      ba2cc621ce142888e001221b881f18dfdf971d16

    • SHA256

      5adacfc1a38f978177f6aa03d8e95e584d75e2cd614aa88a686678f50ec4e0d4

    • SHA512

      2a0fc3c07392ec03dbbb9b23910fec809266d185c73cbf02dc3fbfca5033d1218eb5be576a3852888afbf5a882b9df6d185d3c4a7394bcc113d584600b60f1d1

    • SSDEEP

      1536:NX1CKfcCqx+gRJNfxKGU4Q+GhjOwxLfUP0k6rM5cpGPaOK5e:NX4KEp+yJZxKGlYSwxLu0kc5sPe5e

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks