General

  • Target

    4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b

  • Size

    564KB

  • Sample

    250207-z6e8vazkar

  • MD5

    c709aa33c0165cebde24123555769a7a

  • SHA1

    ad4813cd0461fbdbc7265dc7880e22978ffc7b54

  • SHA256

    4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b

  • SHA512

    ccd0ffc52ed12a4f2e74a0aef982dbd67b271412102e2373e07f24142560e0a0006d60166b1ba789bbb8745067c2d50e3e822f3355bdff2c52d22444151ab7eb

  • SSDEEP

    12288:6yB0aI78IV40HioBu3yCeOr0rS6KsXr7ieWCU:BB07EyCTr0rFf7aC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

cpanel.hackcrack.io:2222

Mutex

Windows Explorer

Attributes
  • reg_key

    Windows Explorer

  • splitter

    |'|'|

Targets

    • Target

      4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b

    • Size

      564KB

    • MD5

      c709aa33c0165cebde24123555769a7a

    • SHA1

      ad4813cd0461fbdbc7265dc7880e22978ffc7b54

    • SHA256

      4314ab3773ddf65e9a290d0889bb09d57fb4968ca49522453e5c9b92ef32f40b

    • SHA512

      ccd0ffc52ed12a4f2e74a0aef982dbd67b271412102e2373e07f24142560e0a0006d60166b1ba789bbb8745067c2d50e3e822f3355bdff2c52d22444151ab7eb

    • SSDEEP

      12288:6yB0aI78IV40HioBu3yCeOr0rS6KsXr7ieWCU:BB07EyCTr0rFf7aC

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

MITRE ATT&CK Enterprise v15

Tasks