General

  • Target

    41e16d26226c15800b3dda0529c07e7d17db42cb7d30023849a595df60e44681

  • Size

    1009KB

  • Sample

    210909-n47pjabcdp

  • MD5

    2bdfc0cc5cad829995fb730b83c099c8

  • SHA1

    3f7a49c990bc5b6fa7df644dd3dd1d7046e35ab5

  • SHA256

    41e16d26226c15800b3dda0529c07e7d17db42cb7d30023849a595df60e44681

  • SHA512

    1563050e048541135b57fef6b14cb14f7a4d95dc63539a1e0677116fef256f1c3fced0aa7fb82567efcc12741c00d4fc37b1b9458e90cbaa3da13ac2f7a3db0d

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

Limebot3

C2

microsoftdnsbug.duckdns.org:6699

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    luffy

Targets

    • Target

      41e16d26226c15800b3dda0529c07e7d17db42cb7d30023849a595df60e44681

    • Size

      1009KB

    • MD5

      2bdfc0cc5cad829995fb730b83c099c8

    • SHA1

      3f7a49c990bc5b6fa7df644dd3dd1d7046e35ab5

    • SHA256

      41e16d26226c15800b3dda0529c07e7d17db42cb7d30023849a595df60e44681

    • SHA512

      1563050e048541135b57fef6b14cb14f7a4d95dc63539a1e0677116fef256f1c3fced0aa7fb82567efcc12741c00d4fc37b1b9458e90cbaa3da13ac2f7a3db0d

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • autoit_exe

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks