General

  • Target

    8dace129815dacb380a62aa39f6a4cc02f7ba630f1edf02f2cf8a92d8f00e97bN.exe

  • Size

    43KB

  • Sample

    241129-d85evstjaz

  • MD5

    b0313c9c6e8d88277fadfdec317f0570

  • SHA1

    e5449108a374250c4b92a00ce8ae71d9d4b1aa86

  • SHA256

    8dace129815dacb380a62aa39f6a4cc02f7ba630f1edf02f2cf8a92d8f00e97b

  • SHA512

    8e84706d0dfc10117f32f956a2b3e3193dda76b61f97c83c0d10df6a4a08c3ef1a13c9121f23f20199b485e0321bf5a3f6e3786ac37e26dd9757600023d964c2

  • SSDEEP

    384:AZyevHn1iDcsyEqtBfkEGCOEhGyOEtzcIij+ZsNO3PlpJKkkjh/TzF7pWno/greT:mhHnU4pEqtNkE5SyZuXQ/oR3+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      8dace129815dacb380a62aa39f6a4cc02f7ba630f1edf02f2cf8a92d8f00e97bN.exe

    • Size

      43KB

    • MD5

      b0313c9c6e8d88277fadfdec317f0570

    • SHA1

      e5449108a374250c4b92a00ce8ae71d9d4b1aa86

    • SHA256

      8dace129815dacb380a62aa39f6a4cc02f7ba630f1edf02f2cf8a92d8f00e97b

    • SHA512

      8e84706d0dfc10117f32f956a2b3e3193dda76b61f97c83c0d10df6a4a08c3ef1a13c9121f23f20199b485e0321bf5a3f6e3786ac37e26dd9757600023d964c2

    • SSDEEP

      384:AZyevHn1iDcsyEqtBfkEGCOEhGyOEtzcIij+ZsNO3PlpJKkkjh/TzF7pWno/greT:mhHnU4pEqtNkE5SyZuXQ/oR3+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks