General

  • Target

    Server.exe

  • Size

    43KB

  • Sample

    250105-j1szrazpcn

  • MD5

    6dd93ac4471a3c615061219b4cd54da3

  • SHA1

    c71064ca536f0cbc633c4e0159b0e72b428ae03a

  • SHA256

    74c40e2f13f3919815e98e4c5b6b1a6a34cd3d0f97ca588d56b4a1ae90979342

  • SHA512

    4b04187edfd322606b34d61234ab13e836cd063bffcf09b694a1754857f8d14c39673b5660d7097da0a269bc1c54872b67552cf47cc695ca2f21c88d65eefa1f

  • SSDEEP

    384:QZyJj+CdsbhKIyKRBxwOIEWrr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnf/greT0pqP:W2NiwFKDx3ukuXQ/oS/+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

run-julie.gl.at.ply.gg:5550

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      Server.exe

    • Size

      43KB

    • MD5

      6dd93ac4471a3c615061219b4cd54da3

    • SHA1

      c71064ca536f0cbc633c4e0159b0e72b428ae03a

    • SHA256

      74c40e2f13f3919815e98e4c5b6b1a6a34cd3d0f97ca588d56b4a1ae90979342

    • SHA512

      4b04187edfd322606b34d61234ab13e836cd063bffcf09b694a1754857f8d14c39673b5660d7097da0a269bc1c54872b67552cf47cc695ca2f21c88d65eefa1f

    • SSDEEP

      384:QZyJj+CdsbhKIyKRBxwOIEWrr2z8Iij+ZsNO3PlpJKkkjh/TzF7pWnf/greT0pqP:W2NiwFKDx3ukuXQ/oS/+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks