General

  • Target

    https://mega.nz/file/aFB1VA4R#-_5zCZjiLTQw_mhuJwHgJvTLXAU9oexEG7LXQWYj1Do

  • Sample

    241224-eradts1mgv

Malware Config

Extracted

Family

njrat

Version

0.7d | By Brontok

Botnet

Victim

C2

spk.accesscam.org:55554

Mutex

m9o1ocabbaxon9ndffebx7uutlcl49nl

Attributes
  • reg_key

    m9o1ocabbaxon9ndffebx7uutlcl49nl

  • splitter

    |'|'|

Targets

    • Target

      https://mega.nz/file/aFB1VA4R#-_5zCZjiLTQw_mhuJwHgJvTLXAU9oexEG7LXQWYj1Do

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks