General

  • Target

    5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f

  • Size

    488KB

  • Sample

    241207-2srqtstlfj

  • MD5

    0e33819a10f6d174189c8d71ffb671f1

  • SHA1

    d617a34a88c424ed60f93ce60f091dd235354ad0

  • SHA256

    5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f

  • SHA512

    ec1e7376df583d9f65feb6bbe95c15fc04b0f8242111b1496029a5932ccf802fea31b9c7171415829f258980591d9d141c304597849c87f6acb0c92baf7634aa

  • SSDEEP

    6144:08JsLcpjzTDDmHayakLkrb4NSarQWYmdUfKyt9XDeXYobgP:RzxzTDWikLSb4NS79mdUfH9zeXYobi

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:15986

Mutex

198d41d5fe2cbc3d7b66a9e7a223f914

Attributes
  • reg_key

    198d41d5fe2cbc3d7b66a9e7a223f914

  • splitter

    |'|'|

Targets

    • Target

      5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f

    • Size

      488KB

    • MD5

      0e33819a10f6d174189c8d71ffb671f1

    • SHA1

      d617a34a88c424ed60f93ce60f091dd235354ad0

    • SHA256

      5731157a1e86abe974e4cad956a53dee2795d87aa7ee23215f7d4b28dc6b9e6f

    • SHA512

      ec1e7376df583d9f65feb6bbe95c15fc04b0f8242111b1496029a5932ccf802fea31b9c7171415829f258980591d9d141c304597849c87f6acb0c92baf7634aa

    • SSDEEP

      6144:08JsLcpjzTDDmHayakLkrb4NSarQWYmdUfKyt9XDeXYobgP:RzxzTDWikLSb4NS79mdUfH9zeXYobi

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks