General

  • Target

    22497ED35962BA4106D6CD6751AFD06B.exe

  • Size

    333KB

  • Sample

    250111-2ssm5atkbv

  • MD5

    22497ed35962ba4106d6cd6751afd06b

  • SHA1

    2010377a9652e65e3e3cce583b06b2232857d8bf

  • SHA256

    4ec0ed4f04a5e091eb8b2f9189e4e6f50dc5c107c3d47e69691fda901a2e0686

  • SHA512

    f2f2dd11679619363be076d33d2147f5ff6c248b378e4fdd2b2e688c3e1a4d32d8287f38f4d313170aae50390c909d3fcef2d9cdf0c58cc66b2df2045518cc52

  • SSDEEP

    6144:vnJMBDdqCP+Y+RJ92nf5O3lPXhRVtGJYub8Upa61MbRDI0zzx/vnG2pFgLbW:vniBB+RJ92nfo3BhRVMBGvOW

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

leechon.hackcrack.io:1111

Mutex

Bluetooth Uninstall Device Task

Attributes
  • reg_key

    Bluetooth Uninstall Device Task

  • splitter

    |'|'|

Targets

    • Target

      22497ED35962BA4106D6CD6751AFD06B.exe

    • Size

      333KB

    • MD5

      22497ed35962ba4106d6cd6751afd06b

    • SHA1

      2010377a9652e65e3e3cce583b06b2232857d8bf

    • SHA256

      4ec0ed4f04a5e091eb8b2f9189e4e6f50dc5c107c3d47e69691fda901a2e0686

    • SHA512

      f2f2dd11679619363be076d33d2147f5ff6c248b378e4fdd2b2e688c3e1a4d32d8287f38f4d313170aae50390c909d3fcef2d9cdf0c58cc66b2df2045518cc52

    • SSDEEP

      6144:vnJMBDdqCP+Y+RJ92nf5O3lPXhRVtGJYub8Upa61MbRDI0zzx/vnG2pFgLbW:vniBB+RJ92nfo3BhRVMBGvOW

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks