General

  • Target

    WindowsApp1.exe

  • Size

    477KB

  • Sample

    250112-nvst1s1kfv

  • MD5

    b5861d91a75a20e8811cefea4af1fe18

  • SHA1

    07defcf78334ffd145cdb4ff2e1163e257c4b957

  • SHA256

    5acde150ebdddc2fc69833d95691746d5c471dc08e74fe0aeb96d06670a536e7

  • SHA512

    072486eca2641fbb5efa4411a067d6c0658e71aed9a2521dd5e5321fab9ee490dfce0b11ea9c008ac054a007be5a8c2801c5a79662c30e984a756e8e7f26722a

  • SSDEEP

    12288:fqNB6ENSUO91dS039TrZgrirZXe1i709aEUpRegYyLs:+QEoUO3dS0tTxXeQ70W3

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

F9t family

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

0ecb0ae2cd4872c3a8e9ee19da99e4b8

Attributes
  • reg_key

    0ecb0ae2cd4872c3a8e9ee19da99e4b8

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      WindowsApp1.exe

    • Size

      477KB

    • MD5

      b5861d91a75a20e8811cefea4af1fe18

    • SHA1

      07defcf78334ffd145cdb4ff2e1163e257c4b957

    • SHA256

      5acde150ebdddc2fc69833d95691746d5c471dc08e74fe0aeb96d06670a536e7

    • SHA512

      072486eca2641fbb5efa4411a067d6c0658e71aed9a2521dd5e5321fab9ee490dfce0b11ea9c008ac054a007be5a8c2801c5a79662c30e984a756e8e7f26722a

    • SSDEEP

      12288:fqNB6ENSUO91dS039TrZgrirZXe1i709aEUpRegYyLs:+QEoUO3dS0tTxXeQ70W3

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks