Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Payload.exe

  • Size

    54KB

  • Sample

    250322-3a76jaxjz3

  • MD5

    81e043b5ee1e8931c5ac4d6f79457590

  • SHA1

    616f70b905d99605586de3fa2997135812f9faa1

  • SHA256

    15e516db2e5992ec2ab10969b8b0fef5f86d37f3720cb3a738011fa3ca56a622

  • SHA512

    e4933e3897f65a54b25f8e97084ab045b96b6645cb3a3ccdab80c0fd29dffdbf5f53a84b4a62c74d5190a3515b01226843b1f18da8f8768e667f7e97a9ee3e64

  • SSDEEP

    1536:r3EVGt9gmgpDGxJSMGFWQcGD8X3xIEpm3g:QVGtGmCGxJSMGFWQnD8X3xIEpm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

associates-studio.gl.at.ply.gg:55946

Mutex

63c41129dcdd177a39b9286624eb2f23

Attributes
  • reg_key

    63c41129dcdd177a39b9286624eb2f23

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      Payload.exe

    • Size

      54KB

    • MD5

      81e043b5ee1e8931c5ac4d6f79457590

    • SHA1

      616f70b905d99605586de3fa2997135812f9faa1

    • SHA256

      15e516db2e5992ec2ab10969b8b0fef5f86d37f3720cb3a738011fa3ca56a622

    • SHA512

      e4933e3897f65a54b25f8e97084ab045b96b6645cb3a3ccdab80c0fd29dffdbf5f53a84b4a62c74d5190a3515b01226843b1f18da8f8768e667f7e97a9ee3e64

    • SSDEEP

      1536:r3EVGt9gmgpDGxJSMGFWQcGD8X3xIEpm3g:QVGtGmCGxJSMGFWQnD8X3xIEpm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks