General

  • Target

    3d108d341213bb91ecdb59d53ab89f87aa418dd03aee7ea1e1d7de60db895e09

  • Size

    8.7MB

  • Sample

    241105-1hgmfa1ran

  • MD5

    7cf7760d1395f7d706fd1c5856bfff87

  • SHA1

    140804d911d75a4051b30e916fb99753672e9c1c

  • SHA256

    3d108d341213bb91ecdb59d53ab89f87aa418dd03aee7ea1e1d7de60db895e09

  • SHA512

    a399ed8f35ee2fb329ad673c67d95ab8d54b42da0974889078822e42d604111576473d782d1030f51408e810e8b30dd9a2d70bb24223f29e4e51e68187350752

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbJ:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      3d108d341213bb91ecdb59d53ab89f87aa418dd03aee7ea1e1d7de60db895e09

    • Size

      8.7MB

    • MD5

      7cf7760d1395f7d706fd1c5856bfff87

    • SHA1

      140804d911d75a4051b30e916fb99753672e9c1c

    • SHA256

      3d108d341213bb91ecdb59d53ab89f87aa418dd03aee7ea1e1d7de60db895e09

    • SHA512

      a399ed8f35ee2fb329ad673c67d95ab8d54b42da0974889078822e42d604111576473d782d1030f51408e810e8b30dd9a2d70bb24223f29e4e51e68187350752

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbJ:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmF

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks