General

  • Target

    ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014

  • Size

    43KB

  • Sample

    220520-eyam6scdel

  • MD5

    0347c6dabe49d64b141bc6aebe418ff1

  • SHA1

    8d5f90740453bf5c37df549cfeebea3cf5fe3bc0

  • SHA256

    ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014

  • SHA512

    725a07b4026712d1081bd8239d942f12cfe20b81c043496ba00af70275af4b38160dffd709bb35612d043afe2132afd220e918c4e3ba6c2bddde81cc58018a1c

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

Hacker

C2

127.0.0.1:3566

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014

    • Size

      43KB

    • MD5

      0347c6dabe49d64b141bc6aebe418ff1

    • SHA1

      8d5f90740453bf5c37df549cfeebea3cf5fe3bc0

    • SHA256

      ad34adbfdf41932a8891f1209113c9cc5d7465214af85d1d9861d9bd11ef1014

    • SHA512

      725a07b4026712d1081bd8239d942f12cfe20b81c043496ba00af70275af4b38160dffd709bb35612d043afe2132afd220e918c4e3ba6c2bddde81cc58018a1c

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks