General

  • Target

    644afc95b56cb3bd71e927bc9770316a02695ed8dfb3ddac80f8e76a95e54c4b

  • Size

    205KB

  • Sample

    220520-etrqwshdf4

  • MD5

    aeee420ae93fe5b9bfce190db58e0df6

  • SHA1

    339eb6b75763ae6239f62e0a15b4b0aff66f2ee1

  • SHA256

    644afc95b56cb3bd71e927bc9770316a02695ed8dfb3ddac80f8e76a95e54c4b

  • SHA512

    ee3b3c31d0b126f50cb0015c419e32b57ae5eaf1e8fd4cb218174a572ca5f5c085630593346a7e5adbc394e1be18078cf1732214696bec5669b73822ab44e0b3

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

someOne

C2

85.253.176.179:1604

Mutex

Java update

Attributes
  • reg_key

    Java update

  • splitter

    |Hassan|

Targets

    • Target

      644afc95b56cb3bd71e927bc9770316a02695ed8dfb3ddac80f8e76a95e54c4b

    • Size

      205KB

    • MD5

      aeee420ae93fe5b9bfce190db58e0df6

    • SHA1

      339eb6b75763ae6239f62e0a15b4b0aff66f2ee1

    • SHA256

      644afc95b56cb3bd71e927bc9770316a02695ed8dfb3ddac80f8e76a95e54c4b

    • SHA512

      ee3b3c31d0b126f50cb0015c419e32b57ae5eaf1e8fd4cb218174a572ca5f5c085630593346a7e5adbc394e1be18078cf1732214696bec5669b73822ab44e0b3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks