General

  • Target

    536e56b6209a3f0a5893ee64c358beef.exe

  • Size

    118KB

  • Sample

    250107-zm5dmaxrbv

  • MD5

    536e56b6209a3f0a5893ee64c358beef

  • SHA1

    d7ab63e972d7ce34b39b5a2376318f0e0d10598e

  • SHA256

    2a1837f12707bb0c3cb62653750004640a029833f7d7790f1d4ce79507a0dd16

  • SHA512

    977a48a9840dd31c29f4cf68b1bad1bcb54df0c1663bba05785431a499ad84c1d7954414012030e895c76d99fb36ab048257b4cea8c377d23aade01319006f6f

  • SSDEEP

    1536:K1v54X1LIpe+gRJNDYVSPacFyq9Qhu4lR8CMomjI9FUv9r0HHP0Yp9YN:K1h4F8e+yJF2lcguNrjI9FUvGHvX/

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

MooReports

C2

154.197.69.14:1433

Mutex

6dc05a59fd2afdd42871a13a6d06ab6f

Attributes
  • reg_key

    6dc05a59fd2afdd42871a13a6d06ab6f

  • splitter

    |'|'|

Targets

    • Target

      536e56b6209a3f0a5893ee64c358beef.exe

    • Size

      118KB

    • MD5

      536e56b6209a3f0a5893ee64c358beef

    • SHA1

      d7ab63e972d7ce34b39b5a2376318f0e0d10598e

    • SHA256

      2a1837f12707bb0c3cb62653750004640a029833f7d7790f1d4ce79507a0dd16

    • SHA512

      977a48a9840dd31c29f4cf68b1bad1bcb54df0c1663bba05785431a499ad84c1d7954414012030e895c76d99fb36ab048257b4cea8c377d23aade01319006f6f

    • SSDEEP

      1536:K1v54X1LIpe+gRJNDYVSPacFyq9Qhu4lR8CMomjI9FUv9r0HHP0Yp9YN:K1h4F8e+yJF2lcguNrjI9FUvGHvX/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks