General

  • Target

    008478ff6c70392e5ecf933881df2c44f31fdf76ad88c407191233cb39de6528.exe

  • Size

    2.3MB

  • Sample

    241207-cfzs8swjar

  • MD5

    e4631d6e2fee44de27d84aff1ce7c7a5

  • SHA1

    d16bc9a9e7249e8f5b519cabbaafa0f1462bccdd

  • SHA256

    008478ff6c70392e5ecf933881df2c44f31fdf76ad88c407191233cb39de6528

  • SHA512

    fdba6e4c6ce13996f05bfa0680383c809b177aedbd300ce42e7f378fd8ad1a1b2cfbc6342b5f0f64d03142bc25f3cf538829cbd01c539ec4c1477121b8f6e8be

  • SSDEEP

    49152:x842+3u+OurHvP4yU222Yd/2bIKxwc6XfnVmAfIg39EJ:x8gTdrHvPfRn8ulx36PrNQ

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

2.tcp.eu.ngrok.io:16299

Mutex

6d90d9a2ca0b357d5f629d5cdbe8d0d2

Attributes
  • reg_key

    6d90d9a2ca0b357d5f629d5cdbe8d0d2

  • splitter

    |'|'|

Targets

    • Target

      008478ff6c70392e5ecf933881df2c44f31fdf76ad88c407191233cb39de6528.exe

    • Size

      2.3MB

    • MD5

      e4631d6e2fee44de27d84aff1ce7c7a5

    • SHA1

      d16bc9a9e7249e8f5b519cabbaafa0f1462bccdd

    • SHA256

      008478ff6c70392e5ecf933881df2c44f31fdf76ad88c407191233cb39de6528

    • SHA512

      fdba6e4c6ce13996f05bfa0680383c809b177aedbd300ce42e7f378fd8ad1a1b2cfbc6342b5f0f64d03142bc25f3cf538829cbd01c539ec4c1477121b8f6e8be

    • SSDEEP

      49152:x842+3u+OurHvP4yU222Yd/2bIKxwc6XfnVmAfIg39EJ:x8gTdrHvPfRn8ulx36PrNQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks