General

  • Target

    e740d976696b7913b1586ea19833622c972482f51e3fb30e3225c94be8cbeeb5

  • Size

    1.1MB

  • Sample

    221130-xnmh4aab7y

  • MD5

    9237433077b158a908db30a6f1bdff34

  • SHA1

    a057b8b37ed2ee5de4c40cbfc4c60e6811a6a0c8

  • SHA256

    e740d976696b7913b1586ea19833622c972482f51e3fb30e3225c94be8cbeeb5

  • SHA512

    40fafea42f71d5d531f671d73886e649f9151a1b9cc28636723962dc1a6d1cdb0a68adf18206012d208703aa0ffc08b8a47c13025291db25e78863106b171132

  • SSDEEP

    24576:/Cdxte/80jYLT3U1jfsWa9T106d5qNdiQ:ew80cTsjkWa9+

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

OfficEr09

C2

194.5.99.17:6521

Mutex

ClienNe.exe

Attributes
  • reg_key

    ClienNe.exe

  • splitter

    1111

Targets

    • Target

      e740d976696b7913b1586ea19833622c972482f51e3fb30e3225c94be8cbeeb5

    • Size

      1.1MB

    • MD5

      9237433077b158a908db30a6f1bdff34

    • SHA1

      a057b8b37ed2ee5de4c40cbfc4c60e6811a6a0c8

    • SHA256

      e740d976696b7913b1586ea19833622c972482f51e3fb30e3225c94be8cbeeb5

    • SHA512

      40fafea42f71d5d531f671d73886e649f9151a1b9cc28636723962dc1a6d1cdb0a68adf18206012d208703aa0ffc08b8a47c13025291db25e78863106b171132

    • SSDEEP

      24576:/Cdxte/80jYLT3U1jfsWa9T106d5qNdiQ:ew80cTsjkWa9+

    Score
    10/10
    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks