General

  • Target

    Camage.exe

  • Size

    6.6MB

  • Sample

    250125-slqqhsyjby

  • MD5

    e0c3eda8d569e0848eabdae133a6b05e

  • SHA1

    f9dcf9fe72740e4fa2f49f4d3012a2ddfa1c3811

  • SHA256

    93671abc447ff16f9151bbefe40db894bc2abc2e0a722221bf2cf31840ad37ae

  • SHA512

    dc83fee38df142504ad06c656ee929671e8064f28e9a59a26d589d636fc08692a535f990414e982d744eb8b3e8e49833c7cd3c02e3bbd21ff0c78bcadbbd2332

  • SSDEEP

    98304:DzLv+e6eh0XWy2u4LhpqIGEB5Okt1QzAFF5Zg51AJE:vLWe6nIrLhHdrQzAFJgDK

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Lammer

C2

station-gps.gl.at.ply.gg:26933

Mutex

ded5a8703334377d83da00a864706211

Attributes
  • reg_key

    ded5a8703334377d83da00a864706211

  • splitter

    |'|'|

Targets

    • Target

      Camage.exe

    • Size

      6.6MB

    • MD5

      e0c3eda8d569e0848eabdae133a6b05e

    • SHA1

      f9dcf9fe72740e4fa2f49f4d3012a2ddfa1c3811

    • SHA256

      93671abc447ff16f9151bbefe40db894bc2abc2e0a722221bf2cf31840ad37ae

    • SHA512

      dc83fee38df142504ad06c656ee929671e8064f28e9a59a26d589d636fc08692a535f990414e982d744eb8b3e8e49833c7cd3c02e3bbd21ff0c78bcadbbd2332

    • SSDEEP

      98304:DzLv+e6eh0XWy2u4LhpqIGEB5Okt1QzAFF5Zg51AJE:vLWe6nIrLhHdrQzAFJgDK

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks