General

  • Target

    32aae04195ac6ece495173d4a21e19b2a2db4c4d1d610ea13356a705b22b5e69.exe

  • Size

    8.7MB

  • Sample

    241203-vjqzlstrhy

  • MD5

    519095c1a410b648ea6fe01907504aab

  • SHA1

    6b1c440d37814d9424d2fa84ab39be3ac33ef3a8

  • SHA256

    32aae04195ac6ece495173d4a21e19b2a2db4c4d1d610ea13356a705b22b5e69

  • SHA512

    d085a1bcf12ee063b8baf47bc3e735fa34460ded6dcbe51d820dd0efe57b4ad6f6dc85e5810b6b2208b869719b275fbd29a4683183b0608b0174f9dc00c96f7b

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb+:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmy

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      32aae04195ac6ece495173d4a21e19b2a2db4c4d1d610ea13356a705b22b5e69.exe

    • Size

      8.7MB

    • MD5

      519095c1a410b648ea6fe01907504aab

    • SHA1

      6b1c440d37814d9424d2fa84ab39be3ac33ef3a8

    • SHA256

      32aae04195ac6ece495173d4a21e19b2a2db4c4d1d610ea13356a705b22b5e69

    • SHA512

      d085a1bcf12ee063b8baf47bc3e735fa34460ded6dcbe51d820dd0efe57b4ad6f6dc85e5810b6b2208b869719b275fbd29a4683183b0608b0174f9dc00c96f7b

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb+:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmy

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks