General

  • Target

    3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943.exe

  • Size

    329KB

  • Sample

    240811-blj5assckb

  • MD5

    9d509cf97138b882335dd50f0a0c34d9

  • SHA1

    3ad0963d838afe0a59d2bd42890b7ff033910cf6

  • SHA256

    3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943

  • SHA512

    67e83ea00bf2e291648fd4a017f566fde4592c19d6a09d67ee097c907aa6cfaa36085ea2dcdf6ef0ff6888453fc496a0c48298414cd07096a1b20e0eb66290d0

  • SSDEEP

    6144:+AAeB34B2Dh19wMY8o/WNOKXOdFefVbYuRpANbhIDeP:+i3XwDON+oG0pD8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

beeoann.hackcrack.io:32949

Mutex

WMI Provider Host

Attributes
  • reg_key

    WMI Provider Host

  • splitter

    |'|'|

Targets

    • Target

      3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943.exe

    • Size

      329KB

    • MD5

      9d509cf97138b882335dd50f0a0c34d9

    • SHA1

      3ad0963d838afe0a59d2bd42890b7ff033910cf6

    • SHA256

      3fed82eee5314ec6282be309f63582b1a3ad0d334e048f973d7fe832ff3fe943

    • SHA512

      67e83ea00bf2e291648fd4a017f566fde4592c19d6a09d67ee097c907aa6cfaa36085ea2dcdf6ef0ff6888453fc496a0c48298414cd07096a1b20e0eb66290d0

    • SSDEEP

      6144:+AAeB34B2Dh19wMY8o/WNOKXOdFefVbYuRpANbhIDeP:+i3XwDON+oG0pD8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks