General

  • Target

    HWID Spoofer.exe

  • Size

    357KB

  • Sample

    241201-qyw2ysxldk

  • MD5

    c9b25c1bc4eb54124dad046b3b9e4241

  • SHA1

    9e075389a2f34e224a68f84a1c5bb4d665077180

  • SHA256

    620b80bcb9f45c4f6f8a0f2c503b4c639deb22c8b2d46d53261f695b51c2b0be

  • SHA512

    75daa5a302e7faa1bca08b5f3101b757c07fe844945557b656143b85d37cf1fb0c45e51592d41a50827c0a2871bb9dfeaed502b5971efa4a307f7ade39bdd52d

  • SSDEEP

    6144:XYn5fNz3b/DKgUff6zxXINL8AlskBgw+uAVJK25HZ56Bk:XYn5fBGn6z9CABkG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

c3deeffb05c4fa7f233694e4990d7e74

Attributes
  • reg_key

    c3deeffb05c4fa7f233694e4990d7e74

  • splitter

    |'|'|

Targets

    • Target

      HWID Spoofer.exe

    • Size

      357KB

    • MD5

      c9b25c1bc4eb54124dad046b3b9e4241

    • SHA1

      9e075389a2f34e224a68f84a1c5bb4d665077180

    • SHA256

      620b80bcb9f45c4f6f8a0f2c503b4c639deb22c8b2d46d53261f695b51c2b0be

    • SHA512

      75daa5a302e7faa1bca08b5f3101b757c07fe844945557b656143b85d37cf1fb0c45e51592d41a50827c0a2871bb9dfeaed502b5971efa4a307f7ade39bdd52d

    • SSDEEP

      6144:XYn5fNz3b/DKgUff6zxXINL8AlskBgw+uAVJK25HZ56Bk:XYn5fBGn6z9CABkG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks