General

  • Target

    brootForce.exe

  • Size

    167KB

  • Sample

    250201-2jd4davqdk

  • MD5

    3964190fb6503039acf4c590f1e22b6a

  • SHA1

    4201a8f44d2c449e47704ea37351589e51ee1e29

  • SHA256

    7c1978631c42844ab98a3580b131b5b279087b9ed2a955c0ff8c22f557ee900e

  • SHA512

    b1fffbb9cd0609440648542e73ed76399eef8e9c39a79bea890ca6c7d1026ebdb30fc5ce9786bff274fe659a7a482a60b514a38fc56a42165a5b8c6e0ed7664c

  • SSDEEP

    3072:e2qK4C4BoN36t4QviFC0MBn3fWl9zWaF9bPYvM9UJ8T2SXZyrgoBJtbN/3MCK2kV:eKP9zgvMx/JdSI5eb

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

HacKed

C2

127.0.0.1:16168

Mutex

svchost.exe

Attributes
  • reg_key

    svchost.exe

  • splitter

    |Ghost|

Targets

    • Target

      brootForce.exe

    • Size

      167KB

    • MD5

      3964190fb6503039acf4c590f1e22b6a

    • SHA1

      4201a8f44d2c449e47704ea37351589e51ee1e29

    • SHA256

      7c1978631c42844ab98a3580b131b5b279087b9ed2a955c0ff8c22f557ee900e

    • SHA512

      b1fffbb9cd0609440648542e73ed76399eef8e9c39a79bea890ca6c7d1026ebdb30fc5ce9786bff274fe659a7a482a60b514a38fc56a42165a5b8c6e0ed7664c

    • SSDEEP

      3072:e2qK4C4BoN36t4QviFC0MBn3fWl9zWaF9bPYvM9UJ8T2SXZyrgoBJtbN/3MCK2kV:eKP9zgvMx/JdSI5eb

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks