General

  • Target

    1d0b683cb6c1908c5d54320e4683a66e52cdf7e01bf1f17f652625f58f864fcc

  • Size

    10.3MB

  • Sample

    250127-t657daxpat

  • MD5

    41027641808a1da816718b483812fbf0

  • SHA1

    1cd8602d5b53ce59e2545ab9b02df4da62af6860

  • SHA256

    1d0b683cb6c1908c5d54320e4683a66e52cdf7e01bf1f17f652625f58f864fcc

  • SHA512

    7f11e1e3329ea702c98b886b7fa7c36ec14bcd6757ca498172fd4891e4db88a2eea0f05a3c604e1e5fbddd8830e265b7829e8321d56a940c6e9240f71df3f7ea

  • SSDEEP

    196608:X8k6KKGQqCdWKSrGAKqGiuP0EUBBzpE+q:MWN7GB640lzprq

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

on-weighted.gl.at.ply.gg:15883

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      1d0b683cb6c1908c5d54320e4683a66e52cdf7e01bf1f17f652625f58f864fcc

    • Size

      10.3MB

    • MD5

      41027641808a1da816718b483812fbf0

    • SHA1

      1cd8602d5b53ce59e2545ab9b02df4da62af6860

    • SHA256

      1d0b683cb6c1908c5d54320e4683a66e52cdf7e01bf1f17f652625f58f864fcc

    • SHA512

      7f11e1e3329ea702c98b886b7fa7c36ec14bcd6757ca498172fd4891e4db88a2eea0f05a3c604e1e5fbddd8830e265b7829e8321d56a940c6e9240f71df3f7ea

    • SSDEEP

      196608:X8k6KKGQqCdWKSrGAKqGiuP0EUBBzpE+q:MWN7GB640lzprq

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks