General

  • Target

    d13cec4552da53d8f26b8acbafbd444402977178ed28be49ed4ca393abbce26d.exe

  • Size

    23KB

  • Sample

    250120-v66cta1lat

  • MD5

    0819e8e98a229f0da3db76eaa17f1cae

  • SHA1

    09fe0c5cee8970d1804b5ae5ec3cf0b49e432baa

  • SHA256

    d13cec4552da53d8f26b8acbafbd444402977178ed28be49ed4ca393abbce26d

  • SHA512

    401f62824f1bfa8b0b8d26678f6d5be4b95c19c0494beb55ec3079d15f86bb1892d18aff6a9d565dac7eb3c81c1c72ab1a208ec685ff89d3b2018cec5ec7ec78

  • SSDEEP

    384:PluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZ9XIL:4OmhtIiRpcnu1L

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

ie-serving.gl.at.ply.gg:18976

Mutex

d386661cfe8f30c3a692533641b57806

Attributes
  • reg_key

    d386661cfe8f30c3a692533641b57806

  • splitter

    |'|'|

Targets

    • Target

      d13cec4552da53d8f26b8acbafbd444402977178ed28be49ed4ca393abbce26d.exe

    • Size

      23KB

    • MD5

      0819e8e98a229f0da3db76eaa17f1cae

    • SHA1

      09fe0c5cee8970d1804b5ae5ec3cf0b49e432baa

    • SHA256

      d13cec4552da53d8f26b8acbafbd444402977178ed28be49ed4ca393abbce26d

    • SHA512

      401f62824f1bfa8b0b8d26678f6d5be4b95c19c0494beb55ec3079d15f86bb1892d18aff6a9d565dac7eb3c81c1c72ab1a208ec685ff89d3b2018cec5ec7ec78

    • SSDEEP

      384:PluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZ9XIL:4OmhtIiRpcnu1L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks