General

  • Target

    botnet.exe

  • Size

    55KB

  • Sample

    250114-sx1d4a1qht

  • MD5

    75c3c6f848f99103c46d785d1a488138

  • SHA1

    3f75be65932cec817261d8a5e4c26ebd643bb07b

  • SHA256

    33d3d6d79232d61d88f214d83d6eab25ad9c40aff24045745795e97955388420

  • SHA512

    66e7dfaabc302b4bea87760869a12d50e9e9657485b14af1bdea7334f3a441675d8c4cd307109e28b6f14962c3d20e7e005ab68562b1ebe6ba6b17bdc246bc50

  • SSDEEP

    1536:D/pMDnE4uNRty4XzPhhDVwsNMDwXExI3pm1Om:dMDnlYk4XdhDVwsNMDwXExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

2.tcp.eu.ngrok.io:14206

Mutex

414bf8bf8acc3fbb7978d9d782a996a1

Attributes
  • reg_key

    414bf8bf8acc3fbb7978d9d782a996a1

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      botnet.exe

    • Size

      55KB

    • MD5

      75c3c6f848f99103c46d785d1a488138

    • SHA1

      3f75be65932cec817261d8a5e4c26ebd643bb07b

    • SHA256

      33d3d6d79232d61d88f214d83d6eab25ad9c40aff24045745795e97955388420

    • SHA512

      66e7dfaabc302b4bea87760869a12d50e9e9657485b14af1bdea7334f3a441675d8c4cd307109e28b6f14962c3d20e7e005ab68562b1ebe6ba6b17bdc246bc50

    • SSDEEP

      1536:D/pMDnE4uNRty4XzPhhDVwsNMDwXExI3pm1Om:dMDnlYk4XdhDVwsNMDwXExI3pm

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Stops running service(s)

    • Drops startup file

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks