General

  • Target

    efcd93564fc1fcdfac673a30ac1150508e8cb4a3e4f981da05ef61392f684a1c

  • Size

    1009KB

  • Sample

    210830-yx4d3fesy2

  • MD5

    62da1e802d6b8d99039a393e81519f55

  • SHA1

    351a5ea21323e3fd4e2376cb27b2254fe321549a

  • SHA256

    efcd93564fc1fcdfac673a30ac1150508e8cb4a3e4f981da05ef61392f684a1c

  • SHA512

    77d65c9125174fface2716df25a53e50f65b9e56d350a069eeb3243e76484eec221cc46defb37476d3e087a4e52aa2a59a42b1ebe3a60c9be82326c875f4472a

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

Limebot3

C2

microsoftdnsbug.duckdns.org:6699

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    luffy

Targets

    • Target

      efcd93564fc1fcdfac673a30ac1150508e8cb4a3e4f981da05ef61392f684a1c

    • Size

      1009KB

    • MD5

      62da1e802d6b8d99039a393e81519f55

    • SHA1

      351a5ea21323e3fd4e2376cb27b2254fe321549a

    • SHA256

      efcd93564fc1fcdfac673a30ac1150508e8cb4a3e4f981da05ef61392f684a1c

    • SHA512

      77d65c9125174fface2716df25a53e50f65b9e56d350a069eeb3243e76484eec221cc46defb37476d3e087a4e52aa2a59a42b1ebe3a60c9be82326c875f4472a

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks