Analysis

  • max time kernel
    171s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 04:35

General

  • Target

    348791e8a9d20781b7c390d8ea05a000d56990a0bda3dd30432e2387d83ad672.exe

  • Size

    43KB

  • MD5

    5a2dd8bd787db4d5c7448c6e29b72de5

  • SHA1

    75d742447106b2aa60692804ed046d25ca9e8af4

  • SHA256

    348791e8a9d20781b7c390d8ea05a000d56990a0bda3dd30432e2387d83ad672

  • SHA512

    6675676bda5f130f0251d2b7d1661f0d623e50a0207a1bfe350ae5e291b5e087e4d9ff7ce5b23cb74852c891740ce85365c69bc30435be41fbeda5ff25ba011a

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\348791e8a9d20781b7c390d8ea05a000d56990a0bda3dd30432e2387d83ad672.exe
    "C:\Users\Admin\AppData\Local\Temp\348791e8a9d20781b7c390d8ea05a000d56990a0bda3dd30432e2387d83ad672.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-54-0x00000000000E0000-0x00000000000F2000-memory.dmp
    Filesize

    72KB

  • memory/1468-55-0x0000000076721000-0x0000000076723000-memory.dmp
    Filesize

    8KB