General

  • Target

    e959904c20607cc9f8c18f64ab6466735d7a673c152f8099fa4817161dfc771f

  • Size

    8.7MB

  • Sample

    241116-xav83s1jdz

  • MD5

    94ca27e1465d448bd3507570b54f7760

  • SHA1

    2d62e1e7a16bd07145dd615c9eaadf9136ca9c33

  • SHA256

    e959904c20607cc9f8c18f64ab6466735d7a673c152f8099fa4817161dfc771f

  • SHA512

    e05693f9dd09730546d15253a8fce9a2cad52b75b9568bd0c4dc90d0d7612c28892d836827a854d1b8ba642cbd3eae6016bffc21cecc0def92b382e44a5b4684

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbi:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      e959904c20607cc9f8c18f64ab6466735d7a673c152f8099fa4817161dfc771f

    • Size

      8.7MB

    • MD5

      94ca27e1465d448bd3507570b54f7760

    • SHA1

      2d62e1e7a16bd07145dd615c9eaadf9136ca9c33

    • SHA256

      e959904c20607cc9f8c18f64ab6466735d7a673c152f8099fa4817161dfc771f

    • SHA512

      e05693f9dd09730546d15253a8fce9a2cad52b75b9568bd0c4dc90d0d7612c28892d836827a854d1b8ba642cbd3eae6016bffc21cecc0def92b382e44a5b4684

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbi:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm2

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks