General

  • Target

    ac93dc198c284dff22cee5391f6fa6dd.exe

  • Size

    25KB

  • Sample

    211215-a6cehsheem

  • MD5

    ac93dc198c284dff22cee5391f6fa6dd

  • SHA1

    8c2e2f2b493abd6ca90ff0436457d52ea928dd43

  • SHA256

    21c6e2e0b14129c7016b431c0d9966bad6a0e35740414d314654df695fb15a68

  • SHA512

    c60337d1ce419d3269c6ac5a08d45e19c969c73be0a7026b0afa8352df777fe7db85c083c0e8a061e02682ea17358935852ea5266fca0000cce78cad5b914064

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

xyi

C2

20.77.246.121:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      ac93dc198c284dff22cee5391f6fa6dd.exe

    • Size

      25KB

    • MD5

      ac93dc198c284dff22cee5391f6fa6dd

    • SHA1

      8c2e2f2b493abd6ca90ff0436457d52ea928dd43

    • SHA256

      21c6e2e0b14129c7016b431c0d9966bad6a0e35740414d314654df695fb15a68

    • SHA512

      c60337d1ce419d3269c6ac5a08d45e19c969c73be0a7026b0afa8352df777fe7db85c083c0e8a061e02682ea17358935852ea5266fca0000cce78cad5b914064

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks