General

  • Target

    redirect

  • Size

    6KB

  • Sample

    250120-v17zfs1jas

  • MD5

    948e3dd71dbaf587679738cb428b0eb6

  • SHA1

    57a11438c38c001e8eee5401476560d0c6317393

  • SHA256

    05759e37c510ab2848b89fcb9b0330f9dde8d3f67bf98b6f3bc1e3e0949d885e

  • SHA512

    f678a73c8471c54c64097a4fd7cbbf4da8503c402255c6bbbb2ed24467bcec9b6c36311f7c7902b694c3bd5e31cadcebd20088e5380c29a10e0ba5c5fc3013c4

  • SSDEEP

    192:dkHLxX7777/77QF7myry0Lod4BYCIkpORXfE:dkr5HY40+CIkpORX8

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HACK

C2

35.159.113.6:1337

Mutex

d8dd25933bbb5fc191f7e51a861b997a

Attributes
  • reg_key

    d8dd25933bbb5fc191f7e51a861b997a

  • splitter

    |'|'|

Targets

    • Target

      redirect

    • Size

      6KB

    • MD5

      948e3dd71dbaf587679738cb428b0eb6

    • SHA1

      57a11438c38c001e8eee5401476560d0c6317393

    • SHA256

      05759e37c510ab2848b89fcb9b0330f9dde8d3f67bf98b6f3bc1e3e0949d885e

    • SHA512

      f678a73c8471c54c64097a4fd7cbbf4da8503c402255c6bbbb2ed24467bcec9b6c36311f7c7902b694c3bd5e31cadcebd20088e5380c29a10e0ba5c5fc3013c4

    • SSDEEP

      192:dkHLxX7777/77QF7myry0Lod4BYCIkpORXfE:dkr5HY40+CIkpORX8

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks