General

  • Target

    2b6620c758c9cc5d7f6760c56de84d00N

  • Size

    8.7MB

  • Sample

    240911-nzyaasyhlc

  • MD5

    2b6620c758c9cc5d7f6760c56de84d00

  • SHA1

    39f1a425b962e10dc496edd5f002f5681975dd12

  • SHA256

    94975078658345fb44f4ef6f2930e33ca51362229cd54ea965e2c1a14e8d98d3

  • SHA512

    f90881adb2bec6622817bc880c857d59614f42851aa1023fcbf7add9d0c97647813797b0489757046d27c4f689d25a04d6c5bb9bf51e1e3dd201fbc17d337a8c

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbl:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmB

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      2b6620c758c9cc5d7f6760c56de84d00N

    • Size

      8.7MB

    • MD5

      2b6620c758c9cc5d7f6760c56de84d00

    • SHA1

      39f1a425b962e10dc496edd5f002f5681975dd12

    • SHA256

      94975078658345fb44f4ef6f2930e33ca51362229cd54ea965e2c1a14e8d98d3

    • SHA512

      f90881adb2bec6622817bc880c857d59614f42851aa1023fcbf7add9d0c97647813797b0489757046d27c4f689d25a04d6c5bb9bf51e1e3dd201fbc17d337a8c

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbl:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmB

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks