General

  • Target

    matrix loder.exe

  • Size

    55KB

  • Sample

    241210-m7yelaypbn

  • MD5

    9a282dfc7b4208af4e6404a9f3286afb

  • SHA1

    2bc2dc49c846a80f92024e3f999a7d3e576fa03b

  • SHA256

    6d58a49e876e1a2b53c0314e17306eff78819064b44618ae23029ffe0a5ba79f

  • SHA512

    4a40417a223f79b250347c4afd1c578f6bc42ce7bdee70d5494a20a09ff40c96237eb0a376c9c49c4d48cb5484b2eca8a7c26b732460ff0c9a94d7dfcabdf7be

  • SSDEEP

    1536:MRksDnHNwZ8Cam8LDdwsNMD2XExI3pmJm:DsDn6SKiDdwsNMD2XExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

fucked by kev

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

ba504e39d49d09ba3f0b71067d651692

Attributes
  • reg_key

    ba504e39d49d09ba3f0b71067d651692

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      matrix loder.exe

    • Size

      55KB

    • MD5

      9a282dfc7b4208af4e6404a9f3286afb

    • SHA1

      2bc2dc49c846a80f92024e3f999a7d3e576fa03b

    • SHA256

      6d58a49e876e1a2b53c0314e17306eff78819064b44618ae23029ffe0a5ba79f

    • SHA512

      4a40417a223f79b250347c4afd1c578f6bc42ce7bdee70d5494a20a09ff40c96237eb0a376c9c49c4d48cb5484b2eca8a7c26b732460ff0c9a94d7dfcabdf7be

    • SSDEEP

      1536:MRksDnHNwZ8Cam8LDdwsNMD2XExI3pmJm:DsDn6SKiDdwsNMD2XExI3pm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks