General

  • Target

    68319fe2345ef2299da17a8de905ce1ce7b70cf3b2d33561da25a058d0f75167N.exe

  • Size

    8.7MB

  • Sample

    241219-fek58synhx

  • MD5

    e779940c77848ee6111062cbd3974f20

  • SHA1

    780c9c6a54645d2fc47e18f4ee8b3d6d4f60f931

  • SHA256

    68319fe2345ef2299da17a8de905ce1ce7b70cf3b2d33561da25a058d0f75167

  • SHA512

    7350b543b0ed964a76ff8e1bfd56530f75c0b756af54618312820c3e7c5d233f3ee98705daa42bc3eeba52a0a67225f854074a6d36439755153fb5f35e224b52

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbw:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmk

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      68319fe2345ef2299da17a8de905ce1ce7b70cf3b2d33561da25a058d0f75167N.exe

    • Size

      8.7MB

    • MD5

      e779940c77848ee6111062cbd3974f20

    • SHA1

      780c9c6a54645d2fc47e18f4ee8b3d6d4f60f931

    • SHA256

      68319fe2345ef2299da17a8de905ce1ce7b70cf3b2d33561da25a058d0f75167

    • SHA512

      7350b543b0ed964a76ff8e1bfd56530f75c0b756af54618312820c3e7c5d233f3ee98705daa42bc3eeba52a0a67225f854074a6d36439755153fb5f35e224b52

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbw:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmk

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks