General

  • Target

    dfd682d846b7bafdf130893d385c8d5a4fcc64d1c1b81e114e46e8deb08ae664

  • Size

    1009KB

  • Sample

    210830-y1gxjjwa7x

  • MD5

    ea90ca0befdcfe335987659cf032f1d0

  • SHA1

    f6e334b13c3bf75a37a5af17a4d3ea193a77e6fa

  • SHA256

    dfd682d846b7bafdf130893d385c8d5a4fcc64d1c1b81e114e46e8deb08ae664

  • SHA512

    5f45a82c52bbc384c53d40fcf50b1193ca1500c382c37a0b0a0c08b3e7c62b63c8b98e6327592e524b01b953ea4c63949f882988d7a6386ab08ad231c9cb2098

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

Limebot3

C2

microsoftdnsbug.duckdns.org:6699

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    luffy

Targets

    • Target

      dfd682d846b7bafdf130893d385c8d5a4fcc64d1c1b81e114e46e8deb08ae664

    • Size

      1009KB

    • MD5

      ea90ca0befdcfe335987659cf032f1d0

    • SHA1

      f6e334b13c3bf75a37a5af17a4d3ea193a77e6fa

    • SHA256

      dfd682d846b7bafdf130893d385c8d5a4fcc64d1c1b81e114e46e8deb08ae664

    • SHA512

      5f45a82c52bbc384c53d40fcf50b1193ca1500c382c37a0b0a0c08b3e7c62b63c8b98e6327592e524b01b953ea4c63949f882988d7a6386ab08ad231c9cb2098

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks