Resubmissions

12-01-2025 12:27

250112-pm6lksskex 10

11-01-2025 19:02

250111-xpzj2swnfv 10

General

  • Target

    32d6f44a96f33b0376787fad25c03ffb986ed4931f7c090534b9c7d60a49ba05.exe

  • Size

    51KB

  • Sample

    250112-pm6lksskex

  • MD5

    bedb91adc3cf626e96d96eb9e3aea4f5

  • SHA1

    edc714f21e19318db06c9adef72395d37a412144

  • SHA256

    32d6f44a96f33b0376787fad25c03ffb986ed4931f7c090534b9c7d60a49ba05

  • SHA512

    587d3a9f80cea22d8404ee1bdb4aac8a343966cc192b43d2a089d7d4196ee289b1a725633a9f49cced3556f12e063b57af7af4563026b557d2182d5cce396040

  • SSDEEP

    768:uFN5WpszMFsmjv0yrM+rMRa8NuLatrNgpWO4:uFN5W+AFsmjst+gRJNEQuw

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Pisun

C2

192.168.8.1:2192

Mutex

4f17247515ce6a71ea4fca5b97bbccaa

Attributes
  • reg_key

    4f17247515ce6a71ea4fca5b97bbccaa

  • splitter

    |'|'|

Targets

    • Target

      32d6f44a96f33b0376787fad25c03ffb986ed4931f7c090534b9c7d60a49ba05.exe

    • Size

      51KB

    • MD5

      bedb91adc3cf626e96d96eb9e3aea4f5

    • SHA1

      edc714f21e19318db06c9adef72395d37a412144

    • SHA256

      32d6f44a96f33b0376787fad25c03ffb986ed4931f7c090534b9c7d60a49ba05

    • SHA512

      587d3a9f80cea22d8404ee1bdb4aac8a343966cc192b43d2a089d7d4196ee289b1a725633a9f49cced3556f12e063b57af7af4563026b557d2182d5cce396040

    • SSDEEP

      768:uFN5WpszMFsmjv0yrM+rMRa8NuLatrNgpWO4:uFN5W+AFsmjst+gRJNEQuw

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks