General

  • Target

    SilverBullet.exe

  • Size

    2.7MB

  • Sample

    241202-dkakks1qcp

  • MD5

    63c99c74fa1f1a9174d8f3013c5a870e

  • SHA1

    4195ef425ca71b31470f3764bce11f8e17f1b992

  • SHA256

    fcbef3a6102e83dad9c7b699cbc37156cd6e0646680628a069cc167052c927b5

  • SHA512

    5c74ab8e25a6e60b529cb2ad73db107f5366a198b3721d2054603af458e8aec4d64c0389c1e01d6238ec46a033ac26916e3f3fd85f6806d6e7144231118a4676

  • SSDEEP

    24576:nzJhZPEDTvlUx71jUhK/DEgOKSvh1TfFIH9gYRRcY+32oQRLwDQF4eaE2cZPeAgq:nsTt0jUiwg30h/7DQB/FOLDQB2zOQB

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

9cpanel.hackcrack.io:3489

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      SilverBullet.exe

    • Size

      2.7MB

    • MD5

      63c99c74fa1f1a9174d8f3013c5a870e

    • SHA1

      4195ef425ca71b31470f3764bce11f8e17f1b992

    • SHA256

      fcbef3a6102e83dad9c7b699cbc37156cd6e0646680628a069cc167052c927b5

    • SHA512

      5c74ab8e25a6e60b529cb2ad73db107f5366a198b3721d2054603af458e8aec4d64c0389c1e01d6238ec46a033ac26916e3f3fd85f6806d6e7144231118a4676

    • SSDEEP

      24576:nzJhZPEDTvlUx71jUhK/DEgOKSvh1TfFIH9gYRRcY+32oQRLwDQF4eaE2cZPeAgq:nsTt0jUiwg30h/7DQB/FOLDQB2zOQB

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks