General

  • Target

    1c8368db627fc2772484d28c8685eb99.exe

  • Size

    6.8MB

  • Sample

    250128-nv55caxmht

  • MD5

    1c8368db627fc2772484d28c8685eb99

  • SHA1

    3850f2b066c1df55c70d63b6d89eb6854fb24df1

  • SHA256

    c9da3969931b59d99a6b21cfabd2677c6c58b848d0a6b19b8c1a9112a2e61e21

  • SHA512

    6e25b79aad59b0ad43ea855ccbeb343dfc51310d9a56ef10dbc6654cff80c2546a87213aed3c09fb524a448aa3d1fc54ae99b9a63933fd3e1ab2c52aee436393

  • SSDEEP

    196608:OJoCz3uizalBzSTIj5JvIe7Vs9oxUDXj8jGphb:YuPzRBIe7VB8T3l

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

-

C2

5.tcp.eu.ngrok.io:15938

Mutex

76f76913a3057d2193e27e6377b7ae49

Attributes
  • reg_key

    76f76913a3057d2193e27e6377b7ae49

  • splitter

    |'|'|

Targets

    • Target

      1c8368db627fc2772484d28c8685eb99.exe

    • Size

      6.8MB

    • MD5

      1c8368db627fc2772484d28c8685eb99

    • SHA1

      3850f2b066c1df55c70d63b6d89eb6854fb24df1

    • SHA256

      c9da3969931b59d99a6b21cfabd2677c6c58b848d0a6b19b8c1a9112a2e61e21

    • SHA512

      6e25b79aad59b0ad43ea855ccbeb343dfc51310d9a56ef10dbc6654cff80c2546a87213aed3c09fb524a448aa3d1fc54ae99b9a63933fd3e1ab2c52aee436393

    • SSDEEP

      196608:OJoCz3uizalBzSTIj5JvIe7Vs9oxUDXj8jGphb:YuPzRBIe7VB8T3l

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks