General

  • Target

    b1004609dd4604c78068f0f2ab7f2448b36259fedcb92043fd03cfaf46d3be5f

  • Size

    1009KB

  • Sample

    210830-vh3kpexztj

  • MD5

    36963af4e87778f45b39091bc6592eef

  • SHA1

    459d5abc7cc856e4cfc5cde82d97c7b5c5cb0011

  • SHA256

    b1004609dd4604c78068f0f2ab7f2448b36259fedcb92043fd03cfaf46d3be5f

  • SHA512

    85f18e57f7655030c752072bd3605d41d6b391d109d7a9626cbb922aee3b71852fa295c7b010595e0353bc11c58b6463132def3e460572bb40ccb87665121a15

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

Limebot3

C2

microsoftdnsbug.duckdns.org:6699

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    luffy

Targets

    • Target

      b1004609dd4604c78068f0f2ab7f2448b36259fedcb92043fd03cfaf46d3be5f

    • Size

      1009KB

    • MD5

      36963af4e87778f45b39091bc6592eef

    • SHA1

      459d5abc7cc856e4cfc5cde82d97c7b5c5cb0011

    • SHA256

      b1004609dd4604c78068f0f2ab7f2448b36259fedcb92043fd03cfaf46d3be5f

    • SHA512

      85f18e57f7655030c752072bd3605d41d6b391d109d7a9626cbb922aee3b71852fa295c7b010595e0353bc11c58b6463132def3e460572bb40ccb87665121a15

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks