General

  • Target

    a5c53ee866d51d6af63e79e7c37e9871.exe

  • Size

    43KB

  • Sample

    211220-ssftwsbgal

  • MD5

    a5c53ee866d51d6af63e79e7c37e9871

  • SHA1

    45284d2633c196757c2b7bba35246a30dbc20454

  • SHA256

    9dd8cb6a13209dd543925a620620d23fb74f5e615c0cd6b3a7c0b208f9fcbeb6

  • SHA512

    c08242a988ca7668ebcb6ea9235655ea17670325b4912189e2723728f85878da58e495d1f455c1d06466ed7acec036fb12a4a040fb7866403adae7c9cb7603dc

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

6.tcp.ngrok.io:17656

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      a5c53ee866d51d6af63e79e7c37e9871.exe

    • Size

      43KB

    • MD5

      a5c53ee866d51d6af63e79e7c37e9871

    • SHA1

      45284d2633c196757c2b7bba35246a30dbc20454

    • SHA256

      9dd8cb6a13209dd543925a620620d23fb74f5e615c0cd6b3a7c0b208f9fcbeb6

    • SHA512

      c08242a988ca7668ebcb6ea9235655ea17670325b4912189e2723728f85878da58e495d1f455c1d06466ed7acec036fb12a4a040fb7866403adae7c9cb7603dc

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

      suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks