General

  • Target

    njRAT v0.7d Green Edition.7z

  • Size

    1.6MB

  • Sample

    250209-sr9qksvndm

  • MD5

    d3e6fcd5df337cbdd82e20ec733974c6

  • SHA1

    cdfe616636aa7bbfde3fe213e23adf86ee630907

  • SHA256

    9f4bf59a47155bbab62e0f5ab2e9a9eb4d734a151fd379357bb7096b36494e17

  • SHA512

    f9c1273527d7d5cd40b32c9b554d35d7963ad634700abd4cbe8b45a0e1e13feec5b685cd6dbbb75b1eea1caf27cdf6c5054d3fff3a65ea6686be20de3abee84e

  • SSDEEP

    49152:p2hBKynG7aq/lhMSO6fCOCX+W3au6TSR1:p2DKyG//lySz6f31

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

fedf8177701c2b8eba54e8334d5decb3

Attributes
  • reg_key

    fedf8177701c2b8eba54e8334d5decb3

  • splitter

    |'|'|

Targets

    • Target

      njRAT v0.7d Green Edition.7z

    • Size

      1.6MB

    • MD5

      d3e6fcd5df337cbdd82e20ec733974c6

    • SHA1

      cdfe616636aa7bbfde3fe213e23adf86ee630907

    • SHA256

      9f4bf59a47155bbab62e0f5ab2e9a9eb4d734a151fd379357bb7096b36494e17

    • SHA512

      f9c1273527d7d5cd40b32c9b554d35d7963ad634700abd4cbe8b45a0e1e13feec5b685cd6dbbb75b1eea1caf27cdf6c5054d3fff3a65ea6686be20de3abee84e

    • SSDEEP

      49152:p2hBKynG7aq/lhMSO6fCOCX+W3au6TSR1:p2DKyG//lySz6f31

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks