General

  • Target

    322d70d90ab8dd1aef5b33fa0381350d5c6c5be26b85aff245dba91943d8a3c5

  • Size

    8.7MB

  • Sample

    250324-22jftaxwhv

  • MD5

    ac4d3fa0ee085d970968585a53527e0b

  • SHA1

    207849832d0c16cb9e52de87af9eb5c90aaba1b8

  • SHA256

    322d70d90ab8dd1aef5b33fa0381350d5c6c5be26b85aff245dba91943d8a3c5

  • SHA512

    b839f8c1583df776a286d74815884c240466e9a77d563293bf724e13d66cd55bfc23c483625f30232552df144ecc138cb08ea0634dca24432782c5547ec2939f

  • SSDEEP

    196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbU:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm4

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

jjj

C2

youri.mooo.com:1605

Mutex

e936a10f968ac948cd351c9629dbd36d

Attributes
  • reg_key

    e936a10f968ac948cd351c9629dbd36d

  • splitter

    |'|'|

Targets

    • Target

      322d70d90ab8dd1aef5b33fa0381350d5c6c5be26b85aff245dba91943d8a3c5

    • Size

      8.7MB

    • MD5

      ac4d3fa0ee085d970968585a53527e0b

    • SHA1

      207849832d0c16cb9e52de87af9eb5c90aaba1b8

    • SHA256

      322d70d90ab8dd1aef5b33fa0381350d5c6c5be26b85aff245dba91943d8a3c5

    • SHA512

      b839f8c1583df776a286d74815884c240466e9a77d563293bf724e13d66cd55bfc23c483625f30232552df144ecc138cb08ea0634dca24432782c5547ec2939f

    • SSDEEP

      196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbU:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGm4

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks