General

  • Target

    8534f05581f0f42bcc545152a2b244fedeeda30a6cc8358f823f02308b72a123_JC.exe

  • Size

    43KB

  • Sample

    231011-2g2rnagg8y

  • MD5

    b52a624a11d63ef70e777b6ccfe75d36

  • SHA1

    071cbd2e3fa216fea34a9d009f3dbca1252d98f9

  • SHA256

    8534f05581f0f42bcc545152a2b244fedeeda30a6cc8358f823f02308b72a123

  • SHA512

    36ffda561f4526a81184d420cd1a0e27be82c62294ba8b10522ff8126d3456e507e1f7658643ebe75da0a29c03331ffc5689baf9cc10baa7261e0bbb7dc25d1e

  • SSDEEP

    384:1ZyKGNUst+3gUy6jjhK6qEs1tJqzQIij+ZsNO3PlpJKkkjh/TzF7pWnCmgreT0pe:fSwQh6/h1u14uXQ/ofC+L

Score
10/10

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

6.tcp.eu.ngrok.io:15392

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      8534f05581f0f42bcc545152a2b244fedeeda30a6cc8358f823f02308b72a123_JC.exe

    • Size

      43KB

    • MD5

      b52a624a11d63ef70e777b6ccfe75d36

    • SHA1

      071cbd2e3fa216fea34a9d009f3dbca1252d98f9

    • SHA256

      8534f05581f0f42bcc545152a2b244fedeeda30a6cc8358f823f02308b72a123

    • SHA512

      36ffda561f4526a81184d420cd1a0e27be82c62294ba8b10522ff8126d3456e507e1f7658643ebe75da0a29c03331ffc5689baf9cc10baa7261e0bbb7dc25d1e

    • SSDEEP

      384:1ZyKGNUst+3gUy6jjhK6qEs1tJqzQIij+ZsNO3PlpJKkkjh/TzF7pWnCmgreT0pe:fSwQh6/h1u14uXQ/ofC+L

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks