General

  • Target

    98ac86fb53dc923b5957add5ed869e7a43b404477d062a3776cbd45de46f7ef6.exe

  • Size

    558KB

  • Sample

    240726-fay7asxanq

  • MD5

    953673a4ba6a5972b15223abb63dd00f

  • SHA1

    17152ec54898218f7f204d895feeecc5943d4d56

  • SHA256

    98ac86fb53dc923b5957add5ed869e7a43b404477d062a3776cbd45de46f7ef6

  • SHA512

    bc1f6ceaf894b82b075c84a9e9bbf11ed4d7413d9689351ac01e7811290b5685ffd803871d2dcb6eba86d5aaa37e17fdd0fb007c357640b78aeb7deaa76f4810

  • SSDEEP

    6144:oBDqYtj/Ajex07flWMNYpXW+BjyB0W0bG83n/j7Owf1V7BC3/0ZbR2FbmUT8i:oBDHj/as0cUD+VWinL7b1tBE0hRCbh

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

dcpanel.hackcrack.io:29955

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      98ac86fb53dc923b5957add5ed869e7a43b404477d062a3776cbd45de46f7ef6.exe

    • Size

      558KB

    • MD5

      953673a4ba6a5972b15223abb63dd00f

    • SHA1

      17152ec54898218f7f204d895feeecc5943d4d56

    • SHA256

      98ac86fb53dc923b5957add5ed869e7a43b404477d062a3776cbd45de46f7ef6

    • SHA512

      bc1f6ceaf894b82b075c84a9e9bbf11ed4d7413d9689351ac01e7811290b5685ffd803871d2dcb6eba86d5aaa37e17fdd0fb007c357640b78aeb7deaa76f4810

    • SSDEEP

      6144:oBDqYtj/Ajex07flWMNYpXW+BjyB0W0bG83n/j7Owf1V7BC3/0ZbR2FbmUT8i:oBDHj/as0cUD+VWinL7b1tBE0hRCbh

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks