General

  • Target

    HQ Dorks Generator.exe

  • Size

    848KB

  • Sample

    250103-dyt65sxnay

  • MD5

    a920b8ebf266ee37c1e114ae12dba6a1

  • SHA1

    ad742e8769fbe8e089707bc3d81f3348b54f6838

  • SHA256

    bd0be20774a92281bace372798dd040d22139c183c75640d234a3df26d4bd089

  • SHA512

    cbb9b70c7fe3ff38b7141ab7a3278b9864b0c1300ea40f374b61f4c062e70aad1fa04efc92415585104c4524f468c0bcbc3d133e0eb12782c1bef599f1c126a4

  • SSDEEP

    12288:0/t6UGM7QsdexpZwbsfxOXurBjpOUREzLw2f1WrG8HXXQG6:RG5+obsfxlrBj0+EzLwW1T8HQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10cpanel.hackcrack.io:33982

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      HQ Dorks Generator.exe

    • Size

      848KB

    • MD5

      a920b8ebf266ee37c1e114ae12dba6a1

    • SHA1

      ad742e8769fbe8e089707bc3d81f3348b54f6838

    • SHA256

      bd0be20774a92281bace372798dd040d22139c183c75640d234a3df26d4bd089

    • SHA512

      cbb9b70c7fe3ff38b7141ab7a3278b9864b0c1300ea40f374b61f4c062e70aad1fa04efc92415585104c4524f468c0bcbc3d133e0eb12782c1bef599f1c126a4

    • SSDEEP

      12288:0/t6UGM7QsdexpZwbsfxOXurBjpOUREzLw2f1WrG8HXXQG6:RG5+obsfxlrBj0+EzLwW1T8HQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks