General

  • Target

    99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3

  • Size

    37KB

  • Sample

    241212-nvx4qsvngl

  • MD5

    67931560029cc67967f024e3c42c107a

  • SHA1

    fed599a8ee2a821e9f93109d1e660118ff3f0451

  • SHA256

    99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3

  • SHA512

    85a9a9735e3ba7693ee3d01b808929e48e0ca7d03762ef54a1024ae89238d992310a575fd5c429c62cb2030732dd25033c1ce71e0320c196fd755d62f1c47a96

  • SSDEEP

    384:GaiKMizdnjnBhFbJ8ycPzNX9Bwy25FrAF+rMRTyN/0L+EcoinblneHQM3epzXiNR:zignlLJfcPzNXt2zrM+rMRa8NuIVt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

45.83.207.236:5552

Mutex

c932779fadb451b44351b10e6e56bf73

Attributes
  • reg_key

    c932779fadb451b44351b10e6e56bf73

  • splitter

    |'|'|

Targets

    • Target

      99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3

    • Size

      37KB

    • MD5

      67931560029cc67967f024e3c42c107a

    • SHA1

      fed599a8ee2a821e9f93109d1e660118ff3f0451

    • SHA256

      99e3e8a30f946770b612f530e63f0448d4e0dc261d165918b09abd2dd67d08c3

    • SHA512

      85a9a9735e3ba7693ee3d01b808929e48e0ca7d03762ef54a1024ae89238d992310a575fd5c429c62cb2030732dd25033c1ce71e0320c196fd755d62f1c47a96

    • SSDEEP

      384:GaiKMizdnjnBhFbJ8ycPzNX9Bwy25FrAF+rMRTyN/0L+EcoinblneHQM3epzXiNR:zignlLJfcPzNXt2zrM+rMRa8NuIVt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks