General

  • Target

    Setup.exe

  • Size

    37KB

  • Sample

    250110-sc5hbazpbr

  • MD5

    e3383ba53ecebb2ecb7063fcccff17dc

  • SHA1

    cd1384e86f194f95c8939418d30c80c56c412645

  • SHA256

    07eaa040d73e39f53851533c8c09d92cd3228d099236e3995b19b4c8a1c15ada

  • SHA512

    563f952147c529230824ae6feaababb3ccbe7eca324d71892d2d4f68ffc0eb6eaf1edce29662c63563cd1f7c6de6e4468b35e2b96a7eb43c93aa7367c2877d34

  • SSDEEP

    384:LpRWUiDZblmJEpRGyEff1PNN0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXPL:9R6HpR9Eff1P0Clm8rM+rMRa8NuxZt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

3.121.113.182:1337

Mutex

0cf848bcebf5d082d484e0ffe1e8f23e

Attributes
  • reg_key

    0cf848bcebf5d082d484e0ffe1e8f23e

  • splitter

    |'|'|

Targets

    • Target

      Setup.exe

    • Size

      37KB

    • MD5

      e3383ba53ecebb2ecb7063fcccff17dc

    • SHA1

      cd1384e86f194f95c8939418d30c80c56c412645

    • SHA256

      07eaa040d73e39f53851533c8c09d92cd3228d099236e3995b19b4c8a1c15ada

    • SHA512

      563f952147c529230824ae6feaababb3ccbe7eca324d71892d2d4f68ffc0eb6eaf1edce29662c63563cd1f7c6de6e4468b35e2b96a7eb43c93aa7367c2877d34

    • SSDEEP

      384:LpRWUiDZblmJEpRGyEff1PNN0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXPL:9R6HpR9Eff1P0Clm8rM+rMRa8NuxZt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks