Resubmissions

16-11-2024 01:20

241116-bqc7jsxaka 10

General

  • Target

    http://discord.com

  • Sample

    241116-bqc7jsxaka

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

7cpanel.hackcrack.io:46143

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks