Resubmissions

14-12-2024 07:58

241214-jtvj1axpfm 10

12-12-2024 19:47

241212-yhx83svqgx 10

General

  • Target

    Payload.exe

  • Size

    55KB

  • Sample

    241214-jtvj1axpfm

  • MD5

    33e1d80a59c7d0c32334ebe05bfbaec0

  • SHA1

    afab8c4fc1216bd5f5e46fd6f029f71de1eaf491

  • SHA256

    fcec89df07c34596a89b0a11a1c113d470843690b81416fd77fd01ef201402f6

  • SHA512

    e0ade8d57d9227de619810bc95aef7f23ec22f496c69aff5b515d809ebb7107e3ed8234202f04028ac4f03f245bc7ad7eafd62622a8c0e9f9ea5b1dcf1b4a69e

  • SSDEEP

    1536:TRksDnHNwZ8Cam8LDdwsNMD2XExI3pm/m:6sDn6SKiDdwsNMD2XExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

fucked by kev

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

ba504e39d49d09ba3f0b71067d651692

Attributes
  • reg_key

    ba504e39d49d09ba3f0b71067d651692

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      Payload.exe

    • Size

      55KB

    • MD5

      33e1d80a59c7d0c32334ebe05bfbaec0

    • SHA1

      afab8c4fc1216bd5f5e46fd6f029f71de1eaf491

    • SHA256

      fcec89df07c34596a89b0a11a1c113d470843690b81416fd77fd01ef201402f6

    • SHA512

      e0ade8d57d9227de619810bc95aef7f23ec22f496c69aff5b515d809ebb7107e3ed8234202f04028ac4f03f245bc7ad7eafd62622a8c0e9f9ea5b1dcf1b4a69e

    • SSDEEP

      1536:TRksDnHNwZ8Cam8LDdwsNMD2XExI3pm/m:6sDn6SKiDdwsNMD2XExI3pm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks