General

  • Target

    1658d9c78eb90c73d9536b54f570c25087789d7dfb04f5c14bb132f57b38902d

  • Size

    370KB

  • Sample

    250109-zea5tazqcy

  • MD5

    0b6b5bdacad8d29067a7108cc6b246c8

  • SHA1

    3fd6362468c4cf4c4b38823bc8635da83970a706

  • SHA256

    1658d9c78eb90c73d9536b54f570c25087789d7dfb04f5c14bb132f57b38902d

  • SHA512

    046d7948b3f35f603b69a1882d679163886726d02b6fa9890024c19be1a02a0d7727a85aa919e4d8ba898a70bea994e10d1501fff35549e8da55ff0d7917889c

  • SSDEEP

    6144:4h3bAQY17xzVdJcRlbMe8lLmDpwXw73g:4hLAP95VwlbMe+K

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

gallery-deadly.gl.at.ply.gg:2251

Mutex

3ad078b94fd440dda2867a26a10d35b4

Attributes
  • reg_key

    3ad078b94fd440dda2867a26a10d35b4

  • splitter

    |'|'|

Targets

    • Target

      1658d9c78eb90c73d9536b54f570c25087789d7dfb04f5c14bb132f57b38902d

    • Size

      370KB

    • MD5

      0b6b5bdacad8d29067a7108cc6b246c8

    • SHA1

      3fd6362468c4cf4c4b38823bc8635da83970a706

    • SHA256

      1658d9c78eb90c73d9536b54f570c25087789d7dfb04f5c14bb132f57b38902d

    • SHA512

      046d7948b3f35f603b69a1882d679163886726d02b6fa9890024c19be1a02a0d7727a85aa919e4d8ba898a70bea994e10d1501fff35549e8da55ff0d7917889c

    • SSDEEP

      6144:4h3bAQY17xzVdJcRlbMe8lLmDpwXw73g:4hLAP95VwlbMe+K

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks