General

  • Target

    9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979N.exe

  • Size

    43KB

  • Sample

    241130-2yaz9ssner

  • MD5

    48843eb13139cd336dd997d873b7ef60

  • SHA1

    d3f2cf851060da0979b7e5d2da47b4c3a786bf76

  • SHA256

    9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979

  • SHA512

    b200414e0fe08c8b9ad3407b5ddbb7a37d862d85c81da3db9a46f1863ef855eba86ded687ab32cc2156a82ea4ddd6dc0fe1f6a0f4cbce2c1d4712eb6d53981c8

  • SSDEEP

    384:mZyaoR5ctOnwtOyW6jlyci8EqnQ4Es472IBzgIij+ZsNO3PlpJKkkjh/TzF7pWnF:8UqAwt/W6pyci8EqQ0479uXQ/om3+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:9096

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979N.exe

    • Size

      43KB

    • MD5

      48843eb13139cd336dd997d873b7ef60

    • SHA1

      d3f2cf851060da0979b7e5d2da47b4c3a786bf76

    • SHA256

      9c2d4c61a7c85525422c51a2c586b3204cd36ee7e32e0778c4968bd36bb16979

    • SHA512

      b200414e0fe08c8b9ad3407b5ddbb7a37d862d85c81da3db9a46f1863ef855eba86ded687ab32cc2156a82ea4ddd6dc0fe1f6a0f4cbce2c1d4712eb6d53981c8

    • SSDEEP

      384:mZyaoR5ctOnwtOyW6jlyci8EqnQ4Es472IBzgIij+ZsNO3PlpJKkkjh/TzF7pWnF:8UqAwt/W6pyci8EqQ0479uXQ/om3+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks