General

  • Target

    0c7e71cb15f3a654bd603ecc875126b5.exe

  • Size

    25KB

  • Sample

    230206-3lkjlsgd56

  • MD5

    0c7e71cb15f3a654bd603ecc875126b5

  • SHA1

    86b9b8214a1f25c1c059201b89b0e058ccc24046

  • SHA256

    697e668ff68ad6ec46a37f3be151cceee3df535f78af08fc290f4553d5b562fb

  • SHA512

    35608317ba260a1483002dbb7271db5b10ca02b07f6f9dde2453bfd449397516ad32fb86d340e37ed140b53e6fdd0d57d113e2d9bf7dc4abf7265235628499e9

  • SSDEEP

    768:svp3Gwda1gHhRsSiBCyiEs81sByH6oCgmj:Q3Gwda1gBVOCyiYyBy3E

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

4.tcp.eu.ngrok.io:12433

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      0c7e71cb15f3a654bd603ecc875126b5.exe

    • Size

      25KB

    • MD5

      0c7e71cb15f3a654bd603ecc875126b5

    • SHA1

      86b9b8214a1f25c1c059201b89b0e058ccc24046

    • SHA256

      697e668ff68ad6ec46a37f3be151cceee3df535f78af08fc290f4553d5b562fb

    • SHA512

      35608317ba260a1483002dbb7271db5b10ca02b07f6f9dde2453bfd449397516ad32fb86d340e37ed140b53e6fdd0d57d113e2d9bf7dc4abf7265235628499e9

    • SSDEEP

      768:svp3Gwda1gHhRsSiBCyiEs81sByH6oCgmj:Q3Gwda1gBVOCyiYyBy3E

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks