General

  • Target

    f000f55baacbd8cb266868ec681f43b630996c159e90a30c155784fe6849fb6dN.exe

  • Size

    65KB

  • Sample

    250103-qtwwdsyrhn

  • MD5

    c496dae04ae896f9fdfe6b1c68ac91b0

  • SHA1

    590c16bccd06d908e3aeaee52d279966cbf4ad34

  • SHA256

    f000f55baacbd8cb266868ec681f43b630996c159e90a30c155784fe6849fb6d

  • SHA512

    3cbb1cbc98bd1d7e6d87f29aa40d108a49b3b71fcc20fbee0e5416e4800d83cb4dc28980e6e3b4091003118386ab02f4841bad42b30655f8293fe5e462bb170a

  • SSDEEP

    1536:2qwkDoN36taQviFw1MGx6BnvbRfLteF3nLrB9z3nGaF9boS9vM:2qwkDoN36taQviFCFQBn1fWl9z2aF9bQ

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:1488

Mutex

gamesense.exe

Attributes
  • reg_key

    gamesense.exe

  • splitter

    |Ghost|

Targets

    • Target

      f000f55baacbd8cb266868ec681f43b630996c159e90a30c155784fe6849fb6dN.exe

    • Size

      65KB

    • MD5

      c496dae04ae896f9fdfe6b1c68ac91b0

    • SHA1

      590c16bccd06d908e3aeaee52d279966cbf4ad34

    • SHA256

      f000f55baacbd8cb266868ec681f43b630996c159e90a30c155784fe6849fb6d

    • SHA512

      3cbb1cbc98bd1d7e6d87f29aa40d108a49b3b71fcc20fbee0e5416e4800d83cb4dc28980e6e3b4091003118386ab02f4841bad42b30655f8293fe5e462bb170a

    • SSDEEP

      1536:2qwkDoN36taQviFw1MGx6BnvbRfLteF3nLrB9z3nGaF9boS9vM:2qwkDoN36taQviFCFQBn1fWl9z2aF9bQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks