General

  • Target

    3f390f2a4f32d4ec988f79a6a4a3b97b.exe

  • Size

    37KB

  • Sample

    250107-2pyd7strbn

  • MD5

    3f390f2a4f32d4ec988f79a6a4a3b97b

  • SHA1

    e84304e45ae03bb421ea0f07e0e94fce052357ae

  • SHA256

    12b8b546038907862b15e79f5cb0fcc2c49fb9240323dd27b48d87309952c134

  • SHA512

    cba6ec596e23d4c957e2ab0591fc7d80add224a8717b7ea09a3bb7086d75d5622f2948c57d177d885c545d4a7140529e1c02f1b58d545d34a2e8bb6d3dd1b9bf

  • SSDEEP

    768:dgMcNwKslUV0bworAa8MzrM+rMRa8NuNrt:G/ylU6PAajM+gRJNa

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

svchost

C2

finzydev.click:1609

Mutex

2bce908736ddb1f07610025aba2cbb94

Attributes
  • reg_key

    2bce908736ddb1f07610025aba2cbb94

  • splitter

    |'|'|

Targets

    • Target

      3f390f2a4f32d4ec988f79a6a4a3b97b.exe

    • Size

      37KB

    • MD5

      3f390f2a4f32d4ec988f79a6a4a3b97b

    • SHA1

      e84304e45ae03bb421ea0f07e0e94fce052357ae

    • SHA256

      12b8b546038907862b15e79f5cb0fcc2c49fb9240323dd27b48d87309952c134

    • SHA512

      cba6ec596e23d4c957e2ab0591fc7d80add224a8717b7ea09a3bb7086d75d5622f2948c57d177d885c545d4a7140529e1c02f1b58d545d34a2e8bb6d3dd1b9bf

    • SSDEEP

      768:dgMcNwKslUV0bworAa8MzrM+rMRa8NuNrt:G/ylU6PAajM+gRJNa

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks