General

  • Target

    1a943048de7457bc63d39e5c70c8f410N

  • Size

    8.7MB

  • Sample

    240914-x6bjjs1hra

  • MD5

    1a943048de7457bc63d39e5c70c8f410

  • SHA1

    6e457c356b9235f2226042cd0ab60418d744fe01

  • SHA256

    5b3764ce0047b796d02e04d2eb31c8360b88be7ffdf2f76e68c588efa6d0e8c3

  • SHA512

    54b2e8da08c1513bbadf549f943cb17a7e53bf58bd76591df555228fdaf4b466a19b675006438abae51b46934cdf749d540910fdc5d63fa0034eec6be539be59

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbq:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      1a943048de7457bc63d39e5c70c8f410N

    • Size

      8.7MB

    • MD5

      1a943048de7457bc63d39e5c70c8f410

    • SHA1

      6e457c356b9235f2226042cd0ab60418d744fe01

    • SHA256

      5b3764ce0047b796d02e04d2eb31c8360b88be7ffdf2f76e68c588efa6d0e8c3

    • SHA512

      54b2e8da08c1513bbadf549f943cb17a7e53bf58bd76591df555228fdaf4b466a19b675006438abae51b46934cdf749d540910fdc5d63fa0034eec6be539be59

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbq:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmu

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks