General

  • Target

    1ada3b8667638281746bea0c4050f1000fd3c4809cebce73a989475028535253N.exe

  • Size

    37KB

  • Sample

    241217-crmm2sxmat

  • MD5

    a14afdaa22be66bb8514bb0fae6224d0

  • SHA1

    4e45378c11720c528fac825dc3199d6ec50af6fa

  • SHA256

    1ada3b8667638281746bea0c4050f1000fd3c4809cebce73a989475028535253

  • SHA512

    0c72b41338d8e7786dbf26a6a93bc23d11bf8ed34656e3ac6c452d3e60ce84d8641c5f00e114a50fdafe1558b0d9e6f8be699c023fe7242d689cae821f85d326

  • SSDEEP

    384:tKaJXyxikPKw+AYNCylTWd9vzDPcm0D9rAF+rMRTyN/0L+EcoinblneHQM3epzXy:8aJCvENRlTWL/105rM+rMRa8NuTIt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

* HaCkEd bY LoKn ;

C2

customers-edmonton.gl.at.ply.gg:28608

Mutex

c0e04992df15316c5d8ec54b808f70d7

Attributes
  • reg_key

    c0e04992df15316c5d8ec54b808f70d7

  • splitter

    |'|'|

Targets

    • Target

      1ada3b8667638281746bea0c4050f1000fd3c4809cebce73a989475028535253N.exe

    • Size

      37KB

    • MD5

      a14afdaa22be66bb8514bb0fae6224d0

    • SHA1

      4e45378c11720c528fac825dc3199d6ec50af6fa

    • SHA256

      1ada3b8667638281746bea0c4050f1000fd3c4809cebce73a989475028535253

    • SHA512

      0c72b41338d8e7786dbf26a6a93bc23d11bf8ed34656e3ac6c452d3e60ce84d8641c5f00e114a50fdafe1558b0d9e6f8be699c023fe7242d689cae821f85d326

    • SSDEEP

      384:tKaJXyxikPKw+AYNCylTWd9vzDPcm0D9rAF+rMRTyN/0L+EcoinblneHQM3epzXy:8aJCvENRlTWL/105rM+rMRa8NuTIt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks