General

  • Target

    0f7b9313f0229b4a2fe163d42a3a6e794333e8ec15c3a2aa7755b2029b3cc98fN

  • Size

    8.7MB

  • Sample

    240923-p3rscswhpp

  • MD5

    5513855bd936f6e123347b1b9f2cae50

  • SHA1

    aafb1fd832b0ee05fd59739d2c8c7d9cb1393c1a

  • SHA256

    0f7b9313f0229b4a2fe163d42a3a6e794333e8ec15c3a2aa7755b2029b3cc98f

  • SHA512

    de3f7ffb76d36e524d8849cfe68f9ceccce370c8a399712c5328d35a6e3f1dd65e1cab574eeabf1034c169c89e414c2627c8191fd2d012371c7f60f1851601bb

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb5:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGml

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      0f7b9313f0229b4a2fe163d42a3a6e794333e8ec15c3a2aa7755b2029b3cc98fN

    • Size

      8.7MB

    • MD5

      5513855bd936f6e123347b1b9f2cae50

    • SHA1

      aafb1fd832b0ee05fd59739d2c8c7d9cb1393c1a

    • SHA256

      0f7b9313f0229b4a2fe163d42a3a6e794333e8ec15c3a2aa7755b2029b3cc98f

    • SHA512

      de3f7ffb76d36e524d8849cfe68f9ceccce370c8a399712c5328d35a6e3f1dd65e1cab574eeabf1034c169c89e414c2627c8191fd2d012371c7f60f1851601bb

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb5:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGml

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks