General

  • Target

    4638b59fa78b904822efb4ff8b4f385b40f49274f4c26eae0e7e246a372ecfec

  • Size

    212KB

  • Sample

    241217-1wmqls1jdj

  • MD5

    fbda28e2485a2eb1f2f9fa74ac9930a4

  • SHA1

    28cbb5ad506e9b59ce95444a04b54db4e85b55da

  • SHA256

    4638b59fa78b904822efb4ff8b4f385b40f49274f4c26eae0e7e246a372ecfec

  • SHA512

    ada222650ee257053b2e767f93d5b36f8f8cb0a95d64706f7e2c9c7dd402822020f6d474570294c31965181dad561c05164a262823fac3a654913d801fc06bea

  • SSDEEP

    1536:e72n8wiGoeA+gRJNR/iWjxABUDQdiltq7ll9mhig+4PUPcHJ4OAI9ntxQLqE8a:e728wT6+yJr/W76Fxjphtg

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

90.188.9.30:80

Mutex

8be188054a9ab6b55d511cab5b851af9

Attributes
  • reg_key

    8be188054a9ab6b55d511cab5b851af9

  • splitter

    |'|'|

Targets

    • Target

      4638b59fa78b904822efb4ff8b4f385b40f49274f4c26eae0e7e246a372ecfec

    • Size

      212KB

    • MD5

      fbda28e2485a2eb1f2f9fa74ac9930a4

    • SHA1

      28cbb5ad506e9b59ce95444a04b54db4e85b55da

    • SHA256

      4638b59fa78b904822efb4ff8b4f385b40f49274f4c26eae0e7e246a372ecfec

    • SHA512

      ada222650ee257053b2e767f93d5b36f8f8cb0a95d64706f7e2c9c7dd402822020f6d474570294c31965181dad561c05164a262823fac3a654913d801fc06bea

    • SSDEEP

      1536:e72n8wiGoeA+gRJNR/iWjxABUDQdiltq7ll9mhig+4PUPcHJ4OAI9ntxQLqE8a:e728wT6+yJr/W76Fxjphtg

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks