General

  • Target

    0d936f1998c4af40879e795549e5ff68682c7d9b884fb0cc0c135c30348292d3.exe

  • Size

    72KB

  • Sample

    250202-df6r8atqaj

  • MD5

    f52133dd61f5a0001aa4a89809894a17

  • SHA1

    9099ce1cbd442ba584cb06a87ef9bec77abbf093

  • SHA256

    0d936f1998c4af40879e795549e5ff68682c7d9b884fb0cc0c135c30348292d3

  • SHA512

    8dbe8e41e8fd6057cc72ba69263b3f35690eadb88b6c3f94fbaa9789d40920be7e2e2cb3d4ef5a7c18a820e7f272472067869ff34495a30b32c301834349a32c

  • SSDEEP

    1536:D2CPAabgGGjSBekWDbSHqtPTOt3tIUBGqqocBQN9f2xPs7aW:iC42xGj7kWIqtPTOtdVBGq+g9qPs+W

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      0d936f1998c4af40879e795549e5ff68682c7d9b884fb0cc0c135c30348292d3.exe

    • Size

      72KB

    • MD5

      f52133dd61f5a0001aa4a89809894a17

    • SHA1

      9099ce1cbd442ba584cb06a87ef9bec77abbf093

    • SHA256

      0d936f1998c4af40879e795549e5ff68682c7d9b884fb0cc0c135c30348292d3

    • SHA512

      8dbe8e41e8fd6057cc72ba69263b3f35690eadb88b6c3f94fbaa9789d40920be7e2e2cb3d4ef5a7c18a820e7f272472067869ff34495a30b32c301834349a32c

    • SSDEEP

      1536:D2CPAabgGGjSBekWDbSHqtPTOt3tIUBGqqocBQN9f2xPs7aW:iC42xGj7kWIqtPTOtdVBGq+g9qPs+W

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks