General

  • Target

    902a286b53a6d2c72531861eeb82e426eb0d3905135fb04835af5352ecff4d94N

  • Size

    8.7MB

  • Sample

    240922-xzhdhsvajh

  • MD5

    b627b0c5382b54be149c5c4b0fcc25a0

  • SHA1

    b81b571eb309692d562b324aeb9491f1a05f448c

  • SHA256

    902a286b53a6d2c72531861eeb82e426eb0d3905135fb04835af5352ecff4d94

  • SHA512

    350a67631e7d343072e686568cdfacfa0e0da64ee6f794a142d46c51440b855b2a4d741f1712ea4e03ae48650e3cc44cbaffdb2d9fb50b4e6711cb4536d74c52

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbj:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      902a286b53a6d2c72531861eeb82e426eb0d3905135fb04835af5352ecff4d94N

    • Size

      8.7MB

    • MD5

      b627b0c5382b54be149c5c4b0fcc25a0

    • SHA1

      b81b571eb309692d562b324aeb9491f1a05f448c

    • SHA256

      902a286b53a6d2c72531861eeb82e426eb0d3905135fb04835af5352ecff4d94

    • SHA512

      350a67631e7d343072e686568cdfacfa0e0da64ee6f794a142d46c51440b855b2a4d741f1712ea4e03ae48650e3cc44cbaffdb2d9fb50b4e6711cb4536d74c52

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbj:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm3

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks