General

  • Target

    MoonHub.exe

  • Size

    55KB

  • Sample

    250115-svgtzawqdw

  • MD5

    d33c25da94cb95d1e34f9d22cfd51f99

  • SHA1

    b0e82ba0f916dd2e104e612c9a5dc73a96a7b2e1

  • SHA256

    f434f44ae7c461b9f88f955cc0977cbf0ae163267b38b5e6ad7989dbcc2d5047

  • SHA512

    460d29f349edf87720b4841bbbd5f8c9b63c81b11d893b9625622ef5912e1f6ded6c85fbe2ed670a31788df9eb4c1d149994cc14f23413d62023e51a2b30e5e1

  • SSDEEP

    1536:V/pMDnE4uNRty4XzPhhDVwsNMDHXExI3pm+m:rMDnlYk4XdhDVwsNMDHXExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

nigger

C2

2.tcp.eu.ngrok.io:13018

Mutex

49a48a7812fddb0d43bb9f70f2221a57

Attributes
  • reg_key

    49a48a7812fddb0d43bb9f70f2221a57

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      MoonHub.exe

    • Size

      55KB

    • MD5

      d33c25da94cb95d1e34f9d22cfd51f99

    • SHA1

      b0e82ba0f916dd2e104e612c9a5dc73a96a7b2e1

    • SHA256

      f434f44ae7c461b9f88f955cc0977cbf0ae163267b38b5e6ad7989dbcc2d5047

    • SHA512

      460d29f349edf87720b4841bbbd5f8c9b63c81b11d893b9625622ef5912e1f6ded6c85fbe2ed670a31788df9eb4c1d149994cc14f23413d62023e51a2b30e5e1

    • SSDEEP

      1536:V/pMDnE4uNRty4XzPhhDVwsNMDHXExI3pm+m:rMDnlYk4XdhDVwsNMDHXExI3pm

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Stops running service(s)

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks