General

  • Target

    Server.exe

  • Size

    37KB

  • Sample

    250401-g43x1sxkz8

  • MD5

    69a63826396394dda992a5031f523b11

  • SHA1

    6ca89b77eaa65d9c970d0071dc2677f852517fc5

  • SHA256

    be045197a762a6d773cd7ddbe97b3a2e5ddac683c271c080fe75cdf03d87b98a

  • SHA512

    aaba1ee3c874a2bd0ca8da8dd5ffa44f57209ac6ed97b44f7ca689b2dbcc45af62256a12edb360e18ea0165c386dff1f7dabf7ffd43b6d3fd6ed2d4eb67c4f1c

  • SSDEEP

    384:EWqBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3epd:x35M5jUvairANsIQxrM+rMRa8NuiGt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

26.ip.gl.ply.gg:55609

Mutex

e70d52b52cebf51e595b7b1265a8cbe7

Attributes
  • reg_key

    e70d52b52cebf51e595b7b1265a8cbe7

  • splitter

    |'|'|

Targets

    • Target

      Server.exe

    • Size

      37KB

    • MD5

      69a63826396394dda992a5031f523b11

    • SHA1

      6ca89b77eaa65d9c970d0071dc2677f852517fc5

    • SHA256

      be045197a762a6d773cd7ddbe97b3a2e5ddac683c271c080fe75cdf03d87b98a

    • SHA512

      aaba1ee3c874a2bd0ca8da8dd5ffa44f57209ac6ed97b44f7ca689b2dbcc45af62256a12edb360e18ea0165c386dff1f7dabf7ffd43b6d3fd6ed2d4eb67c4f1c

    • SSDEEP

      384:EWqBkiyjnDNGRn5IyUvapIrPbh+/VsIt6xrAF+rMRTyN/0L+EcoinblneHQM3epd:x35M5jUvairANsIQxrM+rMRa8NuiGt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks