General

  • Target

    HEUR-Backdoor.MSIL.Crysan.gen-86973c6004a31a5.exe

  • Size

    214KB

  • Sample

    220914-k2rnradecp

  • MD5

    8baf639f36c3392f5ba7ea12f2729652

  • SHA1

    9a73a36a2fd9d9bb40f758ef26e0f8894edb7d41

  • SHA256

    86973c6004a31a5ec071829bc13cc5582f1e0379af467f1362e381f0e8d0c2d9

  • SHA512

    2a2b52c9066781685dac2986b7430470c17c02f8fb1d8067f4e99ebb24a24ea4f84ac06de33da1f3b1011880c9272af58ec0333f634cfe1af73d36079666cae0

  • SSDEEP

    1536:XcNSuix4qLQF0Nfgz36NVzROkbhq/riJvbe+oLd3DdG4ze4H/5jit1u2j1/qPkCH:XcniY/riJS+o55Hxy1uHd

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

topher

C2

6.tcp.ngrok.io:10813

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      HEUR-Backdoor.MSIL.Crysan.gen-86973c6004a31a5.exe

    • Size

      214KB

    • MD5

      8baf639f36c3392f5ba7ea12f2729652

    • SHA1

      9a73a36a2fd9d9bb40f758ef26e0f8894edb7d41

    • SHA256

      86973c6004a31a5ec071829bc13cc5582f1e0379af467f1362e381f0e8d0c2d9

    • SHA512

      2a2b52c9066781685dac2986b7430470c17c02f8fb1d8067f4e99ebb24a24ea4f84ac06de33da1f3b1011880c9272af58ec0333f634cfe1af73d36079666cae0

    • SSDEEP

      1536:XcNSuix4qLQF0Nfgz36NVzROkbhq/riJvbe+oLd3DdG4ze4H/5jit1u2j1/qPkCH:XcniY/riJS+o55Hxy1uHd

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks