General

  • Target

    DisableWDv1.bat

  • Size

    872B

  • Sample

    250108-1txg2avnhs

  • MD5

    7e36cba08cf2f7556651430989871ed3

  • SHA1

    77cdb81c4081e6f3e3dd295738e6b0f128e414d9

  • SHA256

    b40994ebf386e60512bb433bd2d59505dbe20c985a04772eb6c4bf65d2511e3a

  • SHA512

    4cb8cae10769147c6e957d6c185520fd2663a87e55c1f332219cde1b877f915b29b278700d31d676276eb2d34f11aa1b1a34d5fb37cf47c8511bc00058deb924

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/pebiko70/test/main/Server.exe

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

financial-amanda.gl.at.ply.gg:47287

Mutex

023b6c1e71ec3df384e0804152feb1fe

Attributes
  • reg_key

    023b6c1e71ec3df384e0804152feb1fe

  • splitter

    |'|'|

Targets

    • Target

      DisableWDv1.bat

    • Size

      872B

    • MD5

      7e36cba08cf2f7556651430989871ed3

    • SHA1

      77cdb81c4081e6f3e3dd295738e6b0f128e414d9

    • SHA256

      b40994ebf386e60512bb433bd2d59505dbe20c985a04772eb6c4bf65d2511e3a

    • SHA512

      4cb8cae10769147c6e957d6c185520fd2663a87e55c1f332219cde1b877f915b29b278700d31d676276eb2d34f11aa1b1a34d5fb37cf47c8511bc00058deb924

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks