General

  • Target

    f6ba9714a53ffcb889ad90fac6b1d1e048194254f87405a547a7babf00bd7c21N

  • Size

    8.7MB

  • Sample

    241107-yrrgwszrfm

  • MD5

    ef16d2f1a8c095f1d9d9eca58c12e180

  • SHA1

    86823c0d8ff595d4111cc5e884377c8340c4091d

  • SHA256

    f6ba9714a53ffcb889ad90fac6b1d1e048194254f87405a547a7babf00bd7c21

  • SHA512

    ca18df6ff7c3f914778f96a673d3e71d7d95ecccecfb5ba41d33c6e9411b2bc7605a14b03539d747eb518114949772450602211aa743bb3cd1e2fd19e4c3c2ac

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbX:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      f6ba9714a53ffcb889ad90fac6b1d1e048194254f87405a547a7babf00bd7c21N

    • Size

      8.7MB

    • MD5

      ef16d2f1a8c095f1d9d9eca58c12e180

    • SHA1

      86823c0d8ff595d4111cc5e884377c8340c4091d

    • SHA256

      f6ba9714a53ffcb889ad90fac6b1d1e048194254f87405a547a7babf00bd7c21

    • SHA512

      ca18df6ff7c3f914778f96a673d3e71d7d95ecccecfb5ba41d33c6e9411b2bc7605a14b03539d747eb518114949772450602211aa743bb3cd1e2fd19e4c3c2ac

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbX:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmz

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks