General

  • Target

    Kaspersky.exe

  • Size

    93KB

  • Sample

    250329-q87lfawnt7

  • MD5

    327274bc008bf3d8e260af2a4b70d059

  • SHA1

    d4058bac2970b6d2da5b77c3fb5dffeec236262c

  • SHA256

    a13ed5c6556e32a91cb9379fac3ccf5db98c42b157dfb89288f5a75ca326bc75

  • SHA512

    bae8fc052a696de14760336a896290f304182024cfdd5176f112d93f0d7e14b6a632b0e7e01f3744df1dc5f7b9e003d61088a900a7ed7b2ad2797250d725757b

  • SSDEEP

    1536:7V4FQWqkqqoLc2m+isjEwzGi1dDsDMgS:7V4mkqqoA2xiti1dal

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

cheater

C2

hakim32.ddns.net:2000

2.tcp.eu.ngrok.io:17350

Mutex

09a86df6668fdfee2a06a5034dda1e09

Attributes
  • reg_key

    09a86df6668fdfee2a06a5034dda1e09

  • splitter

    |'|'|

Targets

    • Target

      Kaspersky.exe

    • Size

      93KB

    • MD5

      327274bc008bf3d8e260af2a4b70d059

    • SHA1

      d4058bac2970b6d2da5b77c3fb5dffeec236262c

    • SHA256

      a13ed5c6556e32a91cb9379fac3ccf5db98c42b157dfb89288f5a75ca326bc75

    • SHA512

      bae8fc052a696de14760336a896290f304182024cfdd5176f112d93f0d7e14b6a632b0e7e01f3744df1dc5f7b9e003d61088a900a7ed7b2ad2797250d725757b

    • SSDEEP

      1536:7V4FQWqkqqoLc2m+isjEwzGi1dDsDMgS:7V4mkqqoA2xiti1dal

    • Modifies Windows Defender DisableAntiSpyware settings

    • Njrat family

    • Windows security bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks