General

  • Target

    5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0.exe

  • Size

    26KB

  • Sample

    250224-2b8ysa1lx8

  • MD5

    177541a5541eed56d845e699f88ff5cb

  • SHA1

    50c26a3d90a95329d8f1cb6a513e56ae0528507f

  • SHA256

    5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0

  • SHA512

    4e6ba475f91ca3a3045006c3257bff137d01ba47956c9f037ff59f7fff98664343d82cbd8578a061c598362586a532ffea40621123bd41b98bd4c56c8c0bb80a

  • SSDEEP

    384:ALBnSHanO4Y7yJMEoeBCsPodxxMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcam6CrS:eBS/oVt3zA/vMHTi9bD/

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

Recov

C2

193.161.193.99:24753

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0.exe

    • Size

      26KB

    • MD5

      177541a5541eed56d845e699f88ff5cb

    • SHA1

      50c26a3d90a95329d8f1cb6a513e56ae0528507f

    • SHA256

      5cddb195a5f268b825c0936367050288cd4b28992b07303e71e1c4fb169a54d0

    • SHA512

      4e6ba475f91ca3a3045006c3257bff137d01ba47956c9f037ff59f7fff98664343d82cbd8578a061c598362586a532ffea40621123bd41b98bd4c56c8c0bb80a

    • SSDEEP

      384:ALBnSHanO4Y7yJMEoeBCsPodxxMzAQk93vmhm7UMKmIEecKdbXTzm9bVhcam6CrS:eBS/oVt3zA/vMHTi9bD/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks