General

  • Target

    33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35

  • Size

    55KB

  • Sample

    241227-zzwbgszmb1

  • MD5

    f4eb15e168ffc73689af1b666a588b96

  • SHA1

    265717f4934cac2de12f9e7fe0ee8724c587dbb7

  • SHA256

    33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35

  • SHA512

    09f0e489726ba9aa4776063746848b80560efe7390dcea875af8923e648bc7d645e5c6b7d61b0be2ca7d46295372e51426164c1a7cf55a6a3b113a5f7033fc45

  • SSDEEP

    768:AmOsVSt1ManUk2N/PSJ2hrcr3UwhkSN3mwFvfu0YMDHPsXL7XJSxI3pmUm:Am/gDnqN/PSAqzDWwsNMDaXExI3pmUm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

41ebzgw.localto.net:6545

Mutex

2c0e0c6d000bac871a2b654eeca306af

Attributes
  • reg_key

    2c0e0c6d000bac871a2b654eeca306af

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35

    • Size

      55KB

    • MD5

      f4eb15e168ffc73689af1b666a588b96

    • SHA1

      265717f4934cac2de12f9e7fe0ee8724c587dbb7

    • SHA256

      33f5f513babc1070231aaa11690f8d7c8d3920e7df023df5a3ffcb4034c57e35

    • SHA512

      09f0e489726ba9aa4776063746848b80560efe7390dcea875af8923e648bc7d645e5c6b7d61b0be2ca7d46295372e51426164c1a7cf55a6a3b113a5f7033fc45

    • SSDEEP

      768:AmOsVSt1ManUk2N/PSJ2hrcr3UwhkSN3mwFvfu0YMDHPsXL7XJSxI3pmUm:Am/gDnqN/PSAqzDWwsNMDaXExI3pmUm

    Score
    10/10
    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks