General

  • Target

    d859b1d8fd3dcec55a8710251592ae92f5da245e4028eeca281d64a8bb809b8d

  • Size

    1.4MB

  • Sample

    241220-cq3b4swqc1

  • MD5

    ff789c89fca5743a145f628b60a0c21f

  • SHA1

    f2a1e038fc759459431423ae730bd4754185a829

  • SHA256

    d859b1d8fd3dcec55a8710251592ae92f5da245e4028eeca281d64a8bb809b8d

  • SHA512

    c1264ad90c70b2bf4de75a6a71eaa65c090cad71ccbfa0f0b310b5fcadcd9999be6e84e0f44eb14927a49336cd677376f4f949c01ed060451492fc4c56f93a84

  • SSDEEP

    24576:8j1/HA3kt+pPigWA6yWRGVBqCLnTRFb+:G/gTd/40BFnO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

latest-springer.gl.at.ply.gg:35994

Mutex

7d0bc13545737d3cafb88831467aacb2

Attributes
  • reg_key

    7d0bc13545737d3cafb88831467aacb2

  • splitter

    |'|'|

Targets

    • Target

      d859b1d8fd3dcec55a8710251592ae92f5da245e4028eeca281d64a8bb809b8d

    • Size

      1.4MB

    • MD5

      ff789c89fca5743a145f628b60a0c21f

    • SHA1

      f2a1e038fc759459431423ae730bd4754185a829

    • SHA256

      d859b1d8fd3dcec55a8710251592ae92f5da245e4028eeca281d64a8bb809b8d

    • SHA512

      c1264ad90c70b2bf4de75a6a71eaa65c090cad71ccbfa0f0b310b5fcadcd9999be6e84e0f44eb14927a49336cd677376f4f949c01ed060451492fc4c56f93a84

    • SSDEEP

      24576:8j1/HA3kt+pPigWA6yWRGVBqCLnTRFb+:G/gTd/40BFnO

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks