General

  • Target

    16180e400977cc0b4b678d80df6c397aa18c84453010117659a8b34ab18d1491.exe

  • Size

    8.7MB

  • Sample

    241205-vrqzkstncv

  • MD5

    5d039fea0ea1ad9dbdb3b9b3075bd3a0

  • SHA1

    c4a98006c5741bc85dbb4842e609f0540adb0991

  • SHA256

    16180e400977cc0b4b678d80df6c397aa18c84453010117659a8b34ab18d1491

  • SHA512

    dd434a87155301e5f6c6eb3596dd37dc0b8d55feb54f0a0693229cf52fc69d20e3e702a5c7d9f14b699ff2c09ebba54d9e2e7ba03dd75154c03b3e980f5f2f8d

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb1:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      16180e400977cc0b4b678d80df6c397aa18c84453010117659a8b34ab18d1491.exe

    • Size

      8.7MB

    • MD5

      5d039fea0ea1ad9dbdb3b9b3075bd3a0

    • SHA1

      c4a98006c5741bc85dbb4842e609f0540adb0991

    • SHA256

      16180e400977cc0b4b678d80df6c397aa18c84453010117659a8b34ab18d1491

    • SHA512

      dd434a87155301e5f6c6eb3596dd37dc0b8d55feb54f0a0693229cf52fc69d20e3e702a5c7d9f14b699ff2c09ebba54d9e2e7ba03dd75154c03b3e980f5f2f8d

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCb1:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmZ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks