General

  • Target

    d215b98ea91deaa2cfcb95256b85e323d0feeb23825805e2226e23b5f9816bbbN

  • Size

    8.7MB

  • Sample

    240922-bv2eyawajp

  • MD5

    a894de217e97df36a4dff83d67c561e0

  • SHA1

    f8794dd1d0f26f007fe4a59f2c6d4d8f8e14cba0

  • SHA256

    d215b98ea91deaa2cfcb95256b85e323d0feeb23825805e2226e23b5f9816bbb

  • SHA512

    3c79acbd529d1f0e093dc2bdbb9ccbeacb9eda82c3b39503361321243035031e7eaf7c9ae95061b475713fad5a47cb37159bb3afb352a34e903767efee69129d

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbV:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmR

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      d215b98ea91deaa2cfcb95256b85e323d0feeb23825805e2226e23b5f9816bbbN

    • Size

      8.7MB

    • MD5

      a894de217e97df36a4dff83d67c561e0

    • SHA1

      f8794dd1d0f26f007fe4a59f2c6d4d8f8e14cba0

    • SHA256

      d215b98ea91deaa2cfcb95256b85e323d0feeb23825805e2226e23b5f9816bbb

    • SHA512

      3c79acbd529d1f0e093dc2bdbb9ccbeacb9eda82c3b39503361321243035031e7eaf7c9ae95061b475713fad5a47cb37159bb3afb352a34e903767efee69129d

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbV:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmR

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks