General

  • Target

    1de7eb7a3b3f987c9826c23bf38e1aa4.bin

  • Size

    61KB

  • Sample

    240604-bm4kbsga7x

  • MD5

    09c3fb7856da1776efc103d333a371fd

  • SHA1

    b276e1bb7cc937dff23d7507d6d257751911aacf

  • SHA256

    a711ffc2afac8903b9cb8762cdf5296552930cb0f43cb555c0f2ce4e327f8465

  • SHA512

    4b2930b129550e069312ee81c12945e264196d6d01bbc12c0cf0595c2acd3fc4ab12af60f4869d3d035110e70b5deb6a3cd569da67ee3f1e7ae7824c630fb73b

  • SSDEEP

    1536:aoorar/RVVznuiiX4UHVruhw4gcL4wxCAHH0lQ9D6frarNE:j8IupX4UH5u64g9wx5ntJG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      fb92f4bcee1c79fb56625d8c7a4f3e1f3b6cee63567eb49b6138ef5224ba5486.exe

    • Size

      115KB

    • MD5

      1de7eb7a3b3f987c9826c23bf38e1aa4

    • SHA1

      34cc55771ab42b0b53f804fa0fb670c49bb7da89

    • SHA256

      fb92f4bcee1c79fb56625d8c7a4f3e1f3b6cee63567eb49b6138ef5224ba5486

    • SHA512

      a102ee6311c260d7deac6e81f9f43f6616b3d47b07a2a5b4a26518624648bacca05be23054b66ae35d1b1782b4a179c8d5ee0e947431d0b15a5df103791856d9

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDQgd:P5eznsjsguGDFqGZ2rDtd

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks