General

  • Target

    NjRat.0.7D-main.zip

  • Size

    48.8MB

  • Sample

    250330-tnz8eavkv6

  • MD5

    80d3d5163cafe75e0f2d1666a4c65414

  • SHA1

    b94d1e8abcf337c888f403e4e7563c896fa7d51c

  • SHA256

    d96bb6e66aef5a2901a0bfb80df3382d79cdcf60c9916badf27b456244bc6929

  • SHA512

    d606abeacdb158dfdfabd89d7e3c12800704faa499821d01494899d5c36d93d2cc540d8747633535e148abffba4ac8c1fb3016fc03535c3d75cf74edd34daae3

  • SSDEEP

    1572864:u5rfgndUOnIfRGjDT159RHXDZ8411rbYfkI:u5rf0mOnGRaThBZ84frUsI

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

C2

:

Mutex

[RNVD]

Attributes
  • reg_key

    [RNVD]

  • splitter

    |Hassan|

Extracted

Family

njrat

Version

0.7.3

Botnet

Lime

C2

127.0.0.1:6522

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    11

Targets

    • Target

      NjRat.0.7D-main/njRAT Lime Edition/NjRat Lime Edition 0.8.0.exe

    • Size

      9.5MB

    • MD5

      482c73ca6c64073d877cf9c510b872ca

    • SHA1

      0bf34784d312b98d38c107429e48489180484ebf

    • SHA256

      1c617cfb5d8a252e015f9937af47d84f5557d7ebe25f2b2acfeb03671bf08ed9

    • SHA512

      ca1a60df6e96b55071b6d48475bcddea430f84ded41705a796db6f3bc405a0aa41607fa4852d3e2f3e72c1bdd5f37b22e99134e6f3aec8a4b809b417dca2ee96

    • SSDEEP

      49152:PlkGKaDShlBAGHoi/K333dGEoMLez0fgPdLl8HC5IaKSihCwc0YMOBf7BfKjGO+V:PlkwH1i/KZy0fgPVwy70GUOrRMDoMu2

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks