General

  • Target

    bc61e32a987530c2c6e535a9ab237991af141a1c2efffbd9b07aa91639ea7001N.exe

  • Size

    23KB

  • Sample

    241211-mhwvgaymfy

  • MD5

    cce37348cac160de3f94558fd354da00

  • SHA1

    9ea89e03fc299c9f58caf62974b91a24b8947b23

  • SHA256

    bc61e32a987530c2c6e535a9ab237991af141a1c2efffbd9b07aa91639ea7001

  • SHA512

    9a06333590667e6b6e8e711dd07b429b37a246a56117b86c1584d1ad2f083d560618e527bf53e3ed3ab48005156fd7cc0010cc10ebe899eb6bfaaa8cb119c5c5

  • SSDEEP

    384:BY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZGs:2L2s+tRyRpcnuU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

0.tcp.sa.ngrok.io:16176

Mutex

fd4759c8338155e10068a729e4ccb2ba

Attributes
  • reg_key

    fd4759c8338155e10068a729e4ccb2ba

  • splitter

    |'|'|

Targets

    • Target

      bc61e32a987530c2c6e535a9ab237991af141a1c2efffbd9b07aa91639ea7001N.exe

    • Size

      23KB

    • MD5

      cce37348cac160de3f94558fd354da00

    • SHA1

      9ea89e03fc299c9f58caf62974b91a24b8947b23

    • SHA256

      bc61e32a987530c2c6e535a9ab237991af141a1c2efffbd9b07aa91639ea7001

    • SHA512

      9a06333590667e6b6e8e711dd07b429b37a246a56117b86c1584d1ad2f083d560618e527bf53e3ed3ab48005156fd7cc0010cc10ebe899eb6bfaaa8cb119c5c5

    • SSDEEP

      384:BY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZGs:2L2s+tRyRpcnuU

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks