General

  • Target

    Server.exe

  • Size

    43KB

  • Sample

    241222-fts5dsvpcq

  • MD5

    d9dcbd5ca89e7a8e76691c7dca8046c3

  • SHA1

    51036c72c965a41c994bcc6d24d943eebf471c35

  • SHA256

    177954bd295446d67974df22cae9c9d106cce8af9286ef287f1faaf51c1a8255

  • SHA512

    d6ed3f468d1969521b78dd0781730ee77dbf473e5423905e76a0314bd2744e1fcb08ad931b7dc5a89b6def3bd90356400b00c4f73bdeb8a349817094a40d8d69

  • SSDEEP

    384:IZyZcg98NaIyrtdd32E68ETiE7QzsIij+ZsNO3PlpJKkkjh/TzF7pWnXmgreT0pO:+4ywFrLd32HfquXQ/ouC+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

6.tcp.eu.ngrok.io:11237

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      Server.exe

    • Size

      43KB

    • MD5

      d9dcbd5ca89e7a8e76691c7dca8046c3

    • SHA1

      51036c72c965a41c994bcc6d24d943eebf471c35

    • SHA256

      177954bd295446d67974df22cae9c9d106cce8af9286ef287f1faaf51c1a8255

    • SHA512

      d6ed3f468d1969521b78dd0781730ee77dbf473e5423905e76a0314bd2744e1fcb08ad931b7dc5a89b6def3bd90356400b00c4f73bdeb8a349817094a40d8d69

    • SSDEEP

      384:IZyZcg98NaIyrtdd32E68ETiE7QzsIij+ZsNO3PlpJKkkjh/TzF7pWnXmgreT0pO:+4ywFrLd32HfquXQ/ouC+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks