General

  • Target

    6ADD6FA3EA74FFCBA90B3630ACDE5182.exe

  • Size

    76KB

  • Sample

    240128-smk7escce4

  • MD5

    6add6fa3ea74ffcba90b3630acde5182

  • SHA1

    cd202aa598e13a57e6d2bb8c614eb3122d6fb280

  • SHA256

    1092849f2f8f3fb0d1f89f0bff367d0a0f1f138fe5eb45b56f0a970b1677e4be

  • SHA512

    b57f846773f78fda8ba5c8b4b718d092d9037df788d0ea41954d6170bc1e35391ab10d8d12658b8be26e31a16deb78e665c74d5fdc44d11c8bf8216af3ff794b

  • SSDEEP

    1536:I8R7MJTttj9U5XvdKygf7oFOepKmqwBCmDqorCMCX9QKkW:lCftjK5FKZf+OfwcmZ2RX9QLW

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

Svchost

C2

95.173.255.238:4444

Mutex

Windows Defender

Attributes
  • reg_key

    Windows Defender

  • splitter

    |Hassan|

Targets

    • Target

      6ADD6FA3EA74FFCBA90B3630ACDE5182.exe

    • Size

      76KB

    • MD5

      6add6fa3ea74ffcba90b3630acde5182

    • SHA1

      cd202aa598e13a57e6d2bb8c614eb3122d6fb280

    • SHA256

      1092849f2f8f3fb0d1f89f0bff367d0a0f1f138fe5eb45b56f0a970b1677e4be

    • SHA512

      b57f846773f78fda8ba5c8b4b718d092d9037df788d0ea41954d6170bc1e35391ab10d8d12658b8be26e31a16deb78e665c74d5fdc44d11c8bf8216af3ff794b

    • SSDEEP

      1536:I8R7MJTttj9U5XvdKygf7oFOepKmqwBCmDqorCMCX9QKkW:lCftjK5FKZf+OfwcmZ2RX9QLW

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks