General

  • Target

    f19f9a9e40712335d74308b2e69f078dd6203dd1d6c519483c814c1cbe3d70ce

  • Size

    1009KB

  • Sample

    210830-e26vj5gdcj

  • MD5

    4c729d9edd95ee780d14e30ec059f4a8

  • SHA1

    ed9b583cf594ad05ab4051200b903d716158ce28

  • SHA256

    f19f9a9e40712335d74308b2e69f078dd6203dd1d6c519483c814c1cbe3d70ce

  • SHA512

    9fbb33e7b96fa8814f4a3f5c6a945ae36e3368730190cb2e54d2e6ad351af5a8d821032e1a3673b480aacb5a2f333e91e694228f8d2ca30cdfd75642e729c372

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

Limebot3

C2

microsoftdnsbug.duckdns.org:6699

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    luffy

Targets

    • Target

      f19f9a9e40712335d74308b2e69f078dd6203dd1d6c519483c814c1cbe3d70ce

    • Size

      1009KB

    • MD5

      4c729d9edd95ee780d14e30ec059f4a8

    • SHA1

      ed9b583cf594ad05ab4051200b903d716158ce28

    • SHA256

      f19f9a9e40712335d74308b2e69f078dd6203dd1d6c519483c814c1cbe3d70ce

    • SHA512

      9fbb33e7b96fa8814f4a3f5c6a945ae36e3368730190cb2e54d2e6ad351af5a8d821032e1a3673b480aacb5a2f333e91e694228f8d2ca30cdfd75642e729c372

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks