General

  • Target

    d6fc77e4b0fc5e3406b12867dba2345ddb9db16fc6b123cece8f21410c800648

  • Size

    116KB

  • Sample

    240610-wkw3pavgrm

  • MD5

    9b3ac7c0b0f81d9acb66bfe1ece18c2e

  • SHA1

    a6234f8648f024b6de5c3b37a5b1d6fb31370d57

  • SHA256

    d6fc77e4b0fc5e3406b12867dba2345ddb9db16fc6b123cece8f21410c800648

  • SHA512

    0bf1c65f7ce36931ae0124b69a59670ef0dbbdc50617987fe184fc885aa6ce6460494aaf066ca364eb330af197c10add1cb5d74b0956715b392001339eeeb9fb

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLN:P5eznsjsguGDFqGZ2rDLN

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      d6fc77e4b0fc5e3406b12867dba2345ddb9db16fc6b123cece8f21410c800648

    • Size

      116KB

    • MD5

      9b3ac7c0b0f81d9acb66bfe1ece18c2e

    • SHA1

      a6234f8648f024b6de5c3b37a5b1d6fb31370d57

    • SHA256

      d6fc77e4b0fc5e3406b12867dba2345ddb9db16fc6b123cece8f21410c800648

    • SHA512

      0bf1c65f7ce36931ae0124b69a59670ef0dbbdc50617987fe184fc885aa6ce6460494aaf066ca364eb330af197c10add1cb5d74b0956715b392001339eeeb9fb

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLN:P5eznsjsguGDFqGZ2rDLN

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks