General

  • Target

    04e1e2ecfbca3b2496035d00246850d72dfa9888b6c1f913e0f6ce24f88cc8a9N.exe

  • Size

    8.7MB

  • Sample

    241201-w8kpkayjd1

  • MD5

    fd2e8ccc025de31452e22effe554b0c0

  • SHA1

    d2c93661138fa5c0f7714906e3683952b19e2926

  • SHA256

    04e1e2ecfbca3b2496035d00246850d72dfa9888b6c1f913e0f6ce24f88cc8a9

  • SHA512

    88975a1b344888845c1dc9d6d3da98d08066f665edd3ed8e93b3ab458e2ab5790618fa180dec14e612497050056f080ef12b972051f3a4849666277622296ad8

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbz:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      04e1e2ecfbca3b2496035d00246850d72dfa9888b6c1f913e0f6ce24f88cc8a9N.exe

    • Size

      8.7MB

    • MD5

      fd2e8ccc025de31452e22effe554b0c0

    • SHA1

      d2c93661138fa5c0f7714906e3683952b19e2926

    • SHA256

      04e1e2ecfbca3b2496035d00246850d72dfa9888b6c1f913e0f6ce24f88cc8a9

    • SHA512

      88975a1b344888845c1dc9d6d3da98d08066f665edd3ed8e93b3ab458e2ab5790618fa180dec14e612497050056f080ef12b972051f3a4849666277622296ad8

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbz:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmf

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks