General

  • Target

    3acc7d4c37cfa2e6879bc3768907ab2345427009e367caa575cbba022d11857f.exe

  • Size

    8.7MB

  • Sample

    241201-qgpasawqel

  • MD5

    6623512657ddf3256a09e44f14f0219e

  • SHA1

    c3ad43266596d5ae21de35c2cde7a93815c50711

  • SHA256

    3acc7d4c37cfa2e6879bc3768907ab2345427009e367caa575cbba022d11857f

  • SHA512

    3bfc16cbb209b699ee58753be485f99cd78ce5b080d239c4f547aee4c3ff6e5e4a29975d645492bf9bf946bfdbe18a30cb20a543d06d2c8cc1d70d594f4d2d37

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbJ:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmt

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      3acc7d4c37cfa2e6879bc3768907ab2345427009e367caa575cbba022d11857f.exe

    • Size

      8.7MB

    • MD5

      6623512657ddf3256a09e44f14f0219e

    • SHA1

      c3ad43266596d5ae21de35c2cde7a93815c50711

    • SHA256

      3acc7d4c37cfa2e6879bc3768907ab2345427009e367caa575cbba022d11857f

    • SHA512

      3bfc16cbb209b699ee58753be485f99cd78ce5b080d239c4f547aee4c3ff6e5e4a29975d645492bf9bf946bfdbe18a30cb20a543d06d2c8cc1d70d594f4d2d37

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbJ:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks