General

  • Target

    9477c24946cddcec7381a00f13eb421c6ab2028fe1ee81459541de81cb3744ffN

  • Size

    8.7MB

  • Sample

    241102-f3z93a1lcp

  • MD5

    ec8d5844956e20521a4721d07799cb90

  • SHA1

    05b47d90b64b67c567f2a204bdd21bf5b84120e8

  • SHA256

    9477c24946cddcec7381a00f13eb421c6ab2028fe1ee81459541de81cb3744ff

  • SHA512

    e5e3833a8deaedbc0a1b3e5b14c4f89238b581b9d6f6b1c74774de53a764ea467b3ab5b583ab97ec977123f13fa1b705debdaf75d2d4fdc5db7f9d2cd51cf5d9

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbS:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm+

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      9477c24946cddcec7381a00f13eb421c6ab2028fe1ee81459541de81cb3744ffN

    • Size

      8.7MB

    • MD5

      ec8d5844956e20521a4721d07799cb90

    • SHA1

      05b47d90b64b67c567f2a204bdd21bf5b84120e8

    • SHA256

      9477c24946cddcec7381a00f13eb421c6ab2028fe1ee81459541de81cb3744ff

    • SHA512

      e5e3833a8deaedbc0a1b3e5b14c4f89238b581b9d6f6b1c74774de53a764ea467b3ab5b583ab97ec977123f13fa1b705debdaf75d2d4fdc5db7f9d2cd51cf5d9

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbS:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm+

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks