General

  • Target

    Setup.exe

  • Size

    548KB

  • Sample

    241026-y4l3yawmfj

  • MD5

    bc366b2c1803069f350f4192cd676d47

  • SHA1

    f4cb2c5127d8ea90883c0f60c660d0ab92720768

  • SHA256

    5ecf311d38dcc488b93e22c7e7175557f8733dbbb8d6fcd452b911f7821acac8

  • SHA512

    1dacc54d9f2c0b826a29f6683e6e13fc5291c058912922fd9c112ccabb67e7e797d604c99bc16abcf7bfc49a8934cbcc5920d98cab0b44a6001c0f770c53fac5

  • SSDEEP

    12288:tibqI59Pk2cb7p93hn4W0wqTHxMCSHCFIkRXUX9+8:tibqIjk2cvpHn4W41MCSHCBXUXH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

6cpanel.hackcrack.io:35798

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      Setup.exe

    • Size

      548KB

    • MD5

      bc366b2c1803069f350f4192cd676d47

    • SHA1

      f4cb2c5127d8ea90883c0f60c660d0ab92720768

    • SHA256

      5ecf311d38dcc488b93e22c7e7175557f8733dbbb8d6fcd452b911f7821acac8

    • SHA512

      1dacc54d9f2c0b826a29f6683e6e13fc5291c058912922fd9c112ccabb67e7e797d604c99bc16abcf7bfc49a8934cbcc5920d98cab0b44a6001c0f770c53fac5

    • SSDEEP

      12288:tibqI59Pk2cb7p93hn4W0wqTHxMCSHCFIkRXUX9+8:tibqIjk2cvpHn4W41MCSHCBXUXH

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks