General

  • Target

    812e1ee6ec1ad6ad2aa3251eecccbd350b5e50904398df59799e71d437737101.exe

  • Size

    37KB

  • Sample

    250101-dc52hssjgw

  • MD5

    3868437c16370a8ad9e3b5aeb4c6fa08

  • SHA1

    2e4d638e5331d13661f4a7117a06c085b3cbfa6e

  • SHA256

    812e1ee6ec1ad6ad2aa3251eecccbd350b5e50904398df59799e71d437737101

  • SHA512

    42530865557f6b0d9d624dba31da722ae858a8614ee8455f5f6be65d660432ba8b6c80dea6234172c085c88a69329719c4f6b2b847dc49e310b756b2903c2ba6

  • SSDEEP

    384:kN4jjcXCisJfcR9L5YXyc/uSfMVkzHV2bItnCer6rAF+rMRTyN/0L+Ecoinblnef:S4+j5Yic/BhUI4e2rM+rMRa8Nu0CntQ

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

GAY NIGGER

C2

times-sig.gl.at.ply.gg:51482

Mutex

866df5bb46da1e7f608869955f1d1862

Attributes
  • reg_key

    866df5bb46da1e7f608869955f1d1862

  • splitter

    |'|'|

Targets

    • Target

      812e1ee6ec1ad6ad2aa3251eecccbd350b5e50904398df59799e71d437737101.exe

    • Size

      37KB

    • MD5

      3868437c16370a8ad9e3b5aeb4c6fa08

    • SHA1

      2e4d638e5331d13661f4a7117a06c085b3cbfa6e

    • SHA256

      812e1ee6ec1ad6ad2aa3251eecccbd350b5e50904398df59799e71d437737101

    • SHA512

      42530865557f6b0d9d624dba31da722ae858a8614ee8455f5f6be65d660432ba8b6c80dea6234172c085c88a69329719c4f6b2b847dc49e310b756b2903c2ba6

    • SSDEEP

      384:kN4jjcXCisJfcR9L5YXyc/uSfMVkzHV2bItnCer6rAF+rMRTyN/0L+Ecoinblnef:S4+j5Yic/BhUI4e2rM+rMRa8Nu0CntQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks