General

  • Target

    9a5c1d7c7a3f2205bcfabd4634ad303058637d5f0e024aab0abcca21d4a26327N

  • Size

    8.7MB

  • Sample

    241105-zpynvsybke

  • MD5

    8529ba9219d7704f61c85a7dcd528740

  • SHA1

    94a76b6fe4c92a3daed5947160206b2d9bf36af2

  • SHA256

    9a5c1d7c7a3f2205bcfabd4634ad303058637d5f0e024aab0abcca21d4a26327

  • SHA512

    b0d58268ab13c2ae88efc01f4cf7e42bdb0e0897b23a0eb00752dec678b9a8b5698c564f4b700bac6e14dd3036b024c1738cbe491162d689e9fe8be33ebc0772

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbY:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm0

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      9a5c1d7c7a3f2205bcfabd4634ad303058637d5f0e024aab0abcca21d4a26327N

    • Size

      8.7MB

    • MD5

      8529ba9219d7704f61c85a7dcd528740

    • SHA1

      94a76b6fe4c92a3daed5947160206b2d9bf36af2

    • SHA256

      9a5c1d7c7a3f2205bcfabd4634ad303058637d5f0e024aab0abcca21d4a26327

    • SHA512

      b0d58268ab13c2ae88efc01f4cf7e42bdb0e0897b23a0eb00752dec678b9a8b5698c564f4b700bac6e14dd3036b024c1738cbe491162d689e9fe8be33ebc0772

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbY:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm0

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks