General

  • Target

    89e3712fcc566a0a10f8f6f6a01a1617328521fc97938a55a2099a6b1c0b3fd1N

  • Size

    8.7MB

  • Sample

    241105-qz3wwssgqr

  • MD5

    eb852f06a4e47714a79f03456af79a90

  • SHA1

    c24dc7b901d77b2296f78dd6d0cf05682ec6a706

  • SHA256

    89e3712fcc566a0a10f8f6f6a01a1617328521fc97938a55a2099a6b1c0b3fd1

  • SHA512

    257d5716559b0174d22720324bece584e0bf2f6ebc232b14704097309dfcb4f9f4e6eadea159fcd21b63fb73d68d75eacd960c9378cc199a1b885c2b20a22093

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbb:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      89e3712fcc566a0a10f8f6f6a01a1617328521fc97938a55a2099a6b1c0b3fd1N

    • Size

      8.7MB

    • MD5

      eb852f06a4e47714a79f03456af79a90

    • SHA1

      c24dc7b901d77b2296f78dd6d0cf05682ec6a706

    • SHA256

      89e3712fcc566a0a10f8f6f6a01a1617328521fc97938a55a2099a6b1c0b3fd1

    • SHA512

      257d5716559b0174d22720324bece584e0bf2f6ebc232b14704097309dfcb4f9f4e6eadea159fcd21b63fb73d68d75eacd960c9378cc199a1b885c2b20a22093

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbb:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmX

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks