General

  • Target

    https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222/blob/master/Remcos%20Professional%20Cracked%20By%20Alcatraz3222.zip

  • Sample

    250329-k7njaasjx4

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

dllsys.duckdns.org:3202

Mutex

3b570ffeeb3d34249b9a5ce0ee58a328

Attributes
  • reg_key

    3b570ffeeb3d34249b9a5ce0ee58a328

  • splitter

    svchost

Targets

    • Target

      https://github.com/cybertoxin/Remcos-Professional-Cracked-By-Alcatraz3222/blob/master/Remcos%20Professional%20Cracked%20By%20Alcatraz3222.zip

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks