General

  • Target

    0e2ad8e443dc813482e955a6ce5e00c1feceb4a0fb5aa1b000c648546908bee9

  • Size

    37KB

  • Sample

    250124-s46jpavqd1

  • MD5

    1a34f0c5d5cc59cb296d00f185eeb238

  • SHA1

    8048224cd033ee46fe64b25f32f9aba1a79b0f10

  • SHA256

    0e2ad8e443dc813482e955a6ce5e00c1feceb4a0fb5aa1b000c648546908bee9

  • SHA512

    583a5b36a59d22d9d1be74770c7d59ad15d3783dfd9e647a06e44a7db042bd5a76c86f9e874c960577e5d815d639a398a59c8b867d235bbd5ebc885b5ca37036

  • SSDEEP

    768:fLwGNT9Jc5MTOA2rEeVrM+rMRa8Nuhlt:cQT9JcOiA2weO+gRJNG

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

Cam

C2

127.0.0.1:5552

Mutex

84b6e485a252988dbe0c9c221c081973

Attributes
  • reg_key

    84b6e485a252988dbe0c9c221c081973

  • splitter

    |'|'|

Targets

    • Target

      0e2ad8e443dc813482e955a6ce5e00c1feceb4a0fb5aa1b000c648546908bee9

    • Size

      37KB

    • MD5

      1a34f0c5d5cc59cb296d00f185eeb238

    • SHA1

      8048224cd033ee46fe64b25f32f9aba1a79b0f10

    • SHA256

      0e2ad8e443dc813482e955a6ce5e00c1feceb4a0fb5aa1b000c648546908bee9

    • SHA512

      583a5b36a59d22d9d1be74770c7d59ad15d3783dfd9e647a06e44a7db042bd5a76c86f9e874c960577e5d815d639a398a59c8b867d235bbd5ebc885b5ca37036

    • SSDEEP

      768:fLwGNT9Jc5MTOA2rEeVrM+rMRa8Nuhlt:cQT9JcOiA2weO+gRJNG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks