General

  • Target

    bf6a3c9e2fc15c686a58e2d146a7518e7484b51372dd432a5863bae057623330

  • Size

    37KB

  • Sample

    241217-1nklaaypgz

  • MD5

    0a09aa08c401a1c24b8fb8535e16e25a

  • SHA1

    1fc2e9207b54d49c74e9fd3e833cd1dc088022d2

  • SHA256

    bf6a3c9e2fc15c686a58e2d146a7518e7484b51372dd432a5863bae057623330

  • SHA512

    4b4dddb99654be87304a1b1542098c82f95f3f8c35a1d1b19a8a014b29713fb37e87dabc5f24a53d10203b36bd4f9552e97f812951477975ae613d8ea6db1427

  • SSDEEP

    384:hSNBkiy5nDNGRn5IyUvgI1P9h4/C254crAF+rMRTyN/0L+EcoinblneHQM3epzXJ:4O5M5jUv11wq2+crM+rMRa8NuCbet

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Hacked

C2

wbouchraros.theworkpc.com:5552

Mutex

636e3f8f7cbfc871c59e6d158a287b2f

Attributes
  • reg_key

    636e3f8f7cbfc871c59e6d158a287b2f

  • splitter

    |'|'|

Targets

    • Target

      bf6a3c9e2fc15c686a58e2d146a7518e7484b51372dd432a5863bae057623330

    • Size

      37KB

    • MD5

      0a09aa08c401a1c24b8fb8535e16e25a

    • SHA1

      1fc2e9207b54d49c74e9fd3e833cd1dc088022d2

    • SHA256

      bf6a3c9e2fc15c686a58e2d146a7518e7484b51372dd432a5863bae057623330

    • SHA512

      4b4dddb99654be87304a1b1542098c82f95f3f8c35a1d1b19a8a014b29713fb37e87dabc5f24a53d10203b36bd4f9552e97f812951477975ae613d8ea6db1427

    • SSDEEP

      384:hSNBkiy5nDNGRn5IyUvgI1P9h4/C254crAF+rMRTyN/0L+EcoinblneHQM3epzXJ:4O5M5jUv11wq2+crM+rMRa8NuCbet

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks