General

  • Target

    4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854

  • Size

    183KB

  • Sample

    250127-14wngsxlby

  • MD5

    0b786d749488d1dbce96ba6d70b81afb

  • SHA1

    73d338f2788538fc3e082c0bcfda073bccb6c304

  • SHA256

    4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854

  • SHA512

    a2e6478902481aba53f1cc6bd344c55aefc96d880939d33f8a91731983b329392ef75b7e11886809c5321e3e1176484bdd04e96eebd5f7021ba3a705f0f70585

  • SSDEEP

    3072:kmh7/CUBBSUb4XVkF4HGaBEl6OygXlL2RFQoP7JmKWNFTkEt8QXrQQck+/lFOjzP:kmhbCdM4mMgR2RaKWfj8QXrAlMgM

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

kkttyy.kro.kr:2859

Mutex

d059b6aa76c2da376867aa3188bcd31f

Attributes
  • reg_key

    d059b6aa76c2da376867aa3188bcd31f

  • splitter

    |'|'|

Targets

    • Target

      4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854

    • Size

      183KB

    • MD5

      0b786d749488d1dbce96ba6d70b81afb

    • SHA1

      73d338f2788538fc3e082c0bcfda073bccb6c304

    • SHA256

      4ce4a034024c108c1ec4c38bc0235f3ab94b5f308199a5c60e3cd706bfb46854

    • SHA512

      a2e6478902481aba53f1cc6bd344c55aefc96d880939d33f8a91731983b329392ef75b7e11886809c5321e3e1176484bdd04e96eebd5f7021ba3a705f0f70585

    • SSDEEP

      3072:kmh7/CUBBSUb4XVkF4HGaBEl6OygXlL2RFQoP7JmKWNFTkEt8QXrQQck+/lFOjzP:kmhbCdM4mMgR2RaKWfj8QXrAlMgM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks