General

  • Target

    d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe

  • Size

    172KB

  • Sample

    241230-3s3zjaxmfz

  • MD5

    615e7480ad72e1972fc90fbb1fa23bb0

  • SHA1

    aec002a1465c11efcf492273bee97a22c8b6fa77

  • SHA256

    d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d

  • SHA512

    8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19

  • SSDEEP

    3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

learn-rage.gl.at.ply.gg:27556

Mutex

e456603c650484e45e47269f670d15a9

Attributes
  • reg_key

    e456603c650484e45e47269f670d15a9

  • splitter

    |'|'|

Targets

    • Target

      d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe

    • Size

      172KB

    • MD5

      615e7480ad72e1972fc90fbb1fa23bb0

    • SHA1

      aec002a1465c11efcf492273bee97a22c8b6fa77

    • SHA256

      d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d

    • SHA512

      8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19

    • SSDEEP

      3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH

    • Modifies visiblity of hidden/system files in Explorer

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks