General

  • Target

    ec316f5ccd80c60ea9f5dd16d203a59e78f8dc2f43319a1f7f57766bcf7fc6b4

  • Size

    27KB

  • Sample

    220520-etsm7acber

  • MD5

    a8027c6bf42393de8d926204b0a1a8dc

  • SHA1

    b698cf703be7b6c2f5655c502ba8203657f00da8

  • SHA256

    ec316f5ccd80c60ea9f5dd16d203a59e78f8dc2f43319a1f7f57766bcf7fc6b4

  • SHA512

    40f4ec565f57cf12b19ce615543a610cceddc88110f5786fc483ebf1f7462da489a357316d8aefb9278c894bcc40330e99c8c79ad8f5e1537844f0ad1df14792

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

someOne

C2

85.253.176.179:1604

Mutex

Java update

Attributes
  • reg_key

    Java update

  • splitter

    |Hassan|

Targets

    • Target

      FortPathes.exe

    • Size

      205KB

    • MD5

      aeee420ae93fe5b9bfce190db58e0df6

    • SHA1

      339eb6b75763ae6239f62e0a15b4b0aff66f2ee1

    • SHA256

      644afc95b56cb3bd71e927bc9770316a02695ed8dfb3ddac80f8e76a95e54c4b

    • SHA512

      ee3b3c31d0b126f50cb0015c419e32b57ae5eaf1e8fd4cb218174a572ca5f5c085630593346a7e5adbc394e1be18078cf1732214696bec5669b73822ab44e0b3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks