General

  • Target

    b4805d9fa4ac2354f8819c739ddf7095c397e916b29468f065c0907394909fe5.exe

  • Size

    37KB

  • Sample

    241217-ezadsszqex

  • MD5

    d51ff4ddc2f854ca93e0f1d04b73f29e

  • SHA1

    48c15d887fdb2b303def489c857db926cc4453ee

  • SHA256

    b4805d9fa4ac2354f8819c739ddf7095c397e916b29468f065c0907394909fe5

  • SHA512

    5103202e3357da07625653c74957b85949467a7b26506148981e3469ac0df6003e1823f7d66880da31bbc7edfb0e4d93aade6c9c989fb71fcfcac12e434562d4

  • SSDEEP

    384:jp3Eqi0PJZtbH9KyM+2LzmQnfSsWQTNrAF+rMRTyN/0L+EcoinblneHQM3epzXFn:FfJ95M+2L6Q6tQhrM+rMRa8NuPcwt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

svchost.exe

C2

pool-tournaments.gl.at.ply.gg:7445

Mutex

65449e22560e51e0740c2a10dc6c9c59

Attributes
  • reg_key

    65449e22560e51e0740c2a10dc6c9c59

  • splitter

    |'|'|

Targets

    • Target

      b4805d9fa4ac2354f8819c739ddf7095c397e916b29468f065c0907394909fe5.exe

    • Size

      37KB

    • MD5

      d51ff4ddc2f854ca93e0f1d04b73f29e

    • SHA1

      48c15d887fdb2b303def489c857db926cc4453ee

    • SHA256

      b4805d9fa4ac2354f8819c739ddf7095c397e916b29468f065c0907394909fe5

    • SHA512

      5103202e3357da07625653c74957b85949467a7b26506148981e3469ac0df6003e1823f7d66880da31bbc7edfb0e4d93aade6c9c989fb71fcfcac12e434562d4

    • SSDEEP

      384:jp3Eqi0PJZtbH9KyM+2LzmQnfSsWQTNrAF+rMRTyN/0L+EcoinblneHQM3epzXFn:FfJ95M+2L6Q6tQhrM+rMRa8NuPcwt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks