General
-
Target
ratka.bin
-
Size
43KB
-
Sample
220706-fxl59abah8
-
MD5
e01e74c608fddd8dd1581cc12ba596b8
-
SHA1
ab7b8cc4726dae0db4619af8db0923872ae86981
-
SHA256
3605f24cb3b60751d304359176d41c224c150caa7a5f670d373b9a84479ce067
-
SHA512
013d1d8fc44b80e92e7c2d3fa1dc6ed6a38d04e0cead3d0990eb5cb6c614a45185f67e7ad3b7bb5a0f59216f61a29ff6587b55b6aaf1cb2ae811409fcc882edd
Behavioral task
behavioral1
Sample
ratka.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ratka.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
7.tcp.eu.ngrok.io:18065
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
ratka.bin
-
Size
43KB
-
MD5
e01e74c608fddd8dd1581cc12ba596b8
-
SHA1
ab7b8cc4726dae0db4619af8db0923872ae86981
-
SHA256
3605f24cb3b60751d304359176d41c224c150caa7a5f670d373b9a84479ce067
-
SHA512
013d1d8fc44b80e92e7c2d3fa1dc6ed6a38d04e0cead3d0990eb5cb6c614a45185f67e7ad3b7bb5a0f59216f61a29ff6587b55b6aaf1cb2ae811409fcc882edd
Score10/10-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-