General

  • Target

    Gorker Private.exe

  • Size

    895KB

  • Sample

    241208-g8hgwawlax

  • MD5

    533cfcfdbce621d1a75048ed80c82113

  • SHA1

    b840f235522f8775e0f590d65580fc511c63762e

  • SHA256

    8f74d8dcb94fe2599559dee63511ed67eb75fa47cb8b75104002c4baca0e460e

  • SHA512

    c2742323604eaf97df952e6082b20e747fb19c227670eccab58a2a329a24239577af1bb1454fb29b23cb7f0108a9eee9592deb51b462aa7dfbaba4bb6ec61668

  • SSDEEP

    6144:qt5IG6wZ9AI57tN0rBe6TM05wiBRju4h4/aOnzJRQuMIwy5zn98psF16TrG8PsTu:fYAI+rBjpOUREzLw2f1WrG8HXXQG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

9cpanel.hackcrack.io:3489

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      Gorker Private.exe

    • Size

      895KB

    • MD5

      533cfcfdbce621d1a75048ed80c82113

    • SHA1

      b840f235522f8775e0f590d65580fc511c63762e

    • SHA256

      8f74d8dcb94fe2599559dee63511ed67eb75fa47cb8b75104002c4baca0e460e

    • SHA512

      c2742323604eaf97df952e6082b20e747fb19c227670eccab58a2a329a24239577af1bb1454fb29b23cb7f0108a9eee9592deb51b462aa7dfbaba4bb6ec61668

    • SSDEEP

      6144:qt5IG6wZ9AI57tN0rBe6TM05wiBRju4h4/aOnzJRQuMIwy5zn98psF16TrG8PsTu:fYAI+rBjpOUREzLw2f1WrG8HXXQG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks