Resubmissions

08-01-2025 19:05

250108-xrwaea1rak 10

General

  • Target

    Zone-H Fuc_ker.zip

  • Size

    384KB

  • Sample

    250108-xrwaea1rak

  • MD5

    faa611e34f55f3d5a972773b7194ba8d

  • SHA1

    1e9d0de0d241d704fe5991ba898bf7c19cb3979b

  • SHA256

    91433d209f2255901d95cf13f3dd39add159e55ef899549c0fc6aa3081db9821

  • SHA512

    3ef093de7808600757357863dc3194d891a93813ad57f54afd025762c46bcc210d3ef61790d499debe896c295219196bb5a685fa67cc544208a3290dbf4c7c61

  • SSDEEP

    12288:1It/iWEWy/AfJWhsOAmoLqkEarKOrJS/n:1Q/CsGzkLC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

11cpanel.hackcrack.io:60791

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      Zone-H Fuc_ker.zip

    • Size

      384KB

    • MD5

      faa611e34f55f3d5a972773b7194ba8d

    • SHA1

      1e9d0de0d241d704fe5991ba898bf7c19cb3979b

    • SHA256

      91433d209f2255901d95cf13f3dd39add159e55ef899549c0fc6aa3081db9821

    • SHA512

      3ef093de7808600757357863dc3194d891a93813ad57f54afd025762c46bcc210d3ef61790d499debe896c295219196bb5a685fa67cc544208a3290dbf4c7c61

    • SSDEEP

      12288:1It/iWEWy/AfJWhsOAmoLqkEarKOrJS/n:1Q/CsGzkLC

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks