General

  • Target

    cc8e70780dc86ab74f1bba933145bd931e69a9334b21c270486b24ec67cbc522.exe

  • Size

    23KB

  • Sample

    250203-egvxsayrh1

  • MD5

    046a99195ebe039bdb825ebd1ce560a4

  • SHA1

    24ccf20694cf13269313d21c5b7bc4e3dff64d7b

  • SHA256

    cc8e70780dc86ab74f1bba933145bd931e69a9334b21c270486b24ec67cbc522

  • SHA512

    c5d1e5d73010283eb2975a52cc49841a3c89dd93e040b20ab5e17f763135af8cf3570dcc6d43cd25d42f117f480f82d359fd56542100f9d76e4e2b8e1c1cdc17

  • SSDEEP

    384:O8aSyS9gB3Y1KIay2X8cLZI6hgxsGJVPpmRvR6JZlbw8hqIusZzZVb6:B589tXNRpcnuH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

postpix.shop:1177

Mutex

aa63d8c3a8435a58d0b9f32e46b3a601

Attributes
  • reg_key

    aa63d8c3a8435a58d0b9f32e46b3a601

  • splitter

    |'|'|

Targets

    • Target

      cc8e70780dc86ab74f1bba933145bd931e69a9334b21c270486b24ec67cbc522.exe

    • Size

      23KB

    • MD5

      046a99195ebe039bdb825ebd1ce560a4

    • SHA1

      24ccf20694cf13269313d21c5b7bc4e3dff64d7b

    • SHA256

      cc8e70780dc86ab74f1bba933145bd931e69a9334b21c270486b24ec67cbc522

    • SHA512

      c5d1e5d73010283eb2975a52cc49841a3c89dd93e040b20ab5e17f763135af8cf3570dcc6d43cd25d42f117f480f82d359fd56542100f9d76e4e2b8e1c1cdc17

    • SSDEEP

      384:O8aSyS9gB3Y1KIay2X8cLZI6hgxsGJVPpmRvR6JZlbw8hqIusZzZVb6:B589tXNRpcnuH

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks