General

  • Target

    22426a542a836312bd6bcfdafb88ae727fe519046ac3a0ea2af2a2beca285e8f.exe

  • Size

    113KB

  • Sample

    240420-lc6xtaea4v

  • MD5

    a5a6b9c16a029df0b3c7ce63fc12d878

  • SHA1

    63bc2c0f58316ed9f600ea23d6ba6278bca1cad5

  • SHA256

    22426a542a836312bd6bcfdafb88ae727fe519046ac3a0ea2af2a2beca285e8f

  • SHA512

    2cf675c9021923b2dd9da6889aad9bc662234ead6f20b2d064514c9bbcc3a1adbcb7bae1cdabc2aa7b9a3a1fd77be0d4b8830a40eba9ba48bb217c6c45417bc6

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuME:P5eznsjsguGDFqGZ2rE

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      22426a542a836312bd6bcfdafb88ae727fe519046ac3a0ea2af2a2beca285e8f.exe

    • Size

      113KB

    • MD5

      a5a6b9c16a029df0b3c7ce63fc12d878

    • SHA1

      63bc2c0f58316ed9f600ea23d6ba6278bca1cad5

    • SHA256

      22426a542a836312bd6bcfdafb88ae727fe519046ac3a0ea2af2a2beca285e8f

    • SHA512

      2cf675c9021923b2dd9da6889aad9bc662234ead6f20b2d064514c9bbcc3a1adbcb7bae1cdabc2aa7b9a3a1fd77be0d4b8830a40eba9ba48bb217c6c45417bc6

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuME:P5eznsjsguGDFqGZ2rE

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks