General

  • Target

    6111bd8345b67d82be2bec3c92677eddc6c2cf81e633eeb7994522dbddc3b389

  • Size

    43KB

  • Sample

    220524-1e17nsgha5

  • MD5

    bcd50363ac07d8d2d160f22f8455ad56

  • SHA1

    27d0fa8fa6de1b90f9666f0ef7f351073aa7f5b8

  • SHA256

    6111bd8345b67d82be2bec3c92677eddc6c2cf81e633eeb7994522dbddc3b389

  • SHA512

    e3d8b7c9f0111fd9253b2d87457fc20bf4b69bbfc208f049c4574a901f1c5c19a08390b9272ba4a08d9679bdee13094dd7eb9aa7e8b6b96b60fa66c009905d10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKer

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      6111bd8345b67d82be2bec3c92677eddc6c2cf81e633eeb7994522dbddc3b389

    • Size

      43KB

    • MD5

      bcd50363ac07d8d2d160f22f8455ad56

    • SHA1

      27d0fa8fa6de1b90f9666f0ef7f351073aa7f5b8

    • SHA256

      6111bd8345b67d82be2bec3c92677eddc6c2cf81e633eeb7994522dbddc3b389

    • SHA512

      e3d8b7c9f0111fd9253b2d87457fc20bf4b69bbfc208f049c4574a901f1c5c19a08390b9272ba4a08d9679bdee13094dd7eb9aa7e8b6b96b60fa66c009905d10

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Tasks