General

  • Target

    272b706925733fc429dafefabbde24a1

  • Size

    6.3MB

  • Sample

    231231-eh7yqseacq

  • MD5

    272b706925733fc429dafefabbde24a1

  • SHA1

    c6dc4ed69a7ea66c0b5c4b620f8f49e8d0ab277f

  • SHA256

    44d54e64683ebb67eaea413e15112b44c884e940fd74428c04288f2fd9a34980

  • SHA512

    5ddb8f1ef55c172d3ce46cb321bed3dc7aafa94e0a7b588cd956c93218c5adcde05171026686f635233f746953cdbea0d258f9d53c3a406f27e569045a2d42d2

  • SSDEEP

    98304:bF5An3/7s3wTmef6S7Q6oUQfO+JVaYltSEg96QxTxqVIvrjM:bFE3/wgTVB7QjUQfb/bg96QxlaIvrY

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

566

C2

192.168.0.23:1604

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      272b706925733fc429dafefabbde24a1

    • Size

      6.3MB

    • MD5

      272b706925733fc429dafefabbde24a1

    • SHA1

      c6dc4ed69a7ea66c0b5c4b620f8f49e8d0ab277f

    • SHA256

      44d54e64683ebb67eaea413e15112b44c884e940fd74428c04288f2fd9a34980

    • SHA512

      5ddb8f1ef55c172d3ce46cb321bed3dc7aafa94e0a7b588cd956c93218c5adcde05171026686f635233f746953cdbea0d258f9d53c3a406f27e569045a2d42d2

    • SSDEEP

      98304:bF5An3/7s3wTmef6S7Q6oUQfO+JVaYltSEg96QxTxqVIvrjM:bFE3/wgTVB7QjUQfb/bg96QxlaIvrY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks