General

  • Target

    99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3

  • Size

    116KB

  • Sample

    240616-axw3ka1hkh

  • MD5

    01fd7c260144e43f934a18b6ebdec174

  • SHA1

    56046e01bf3040b681cada52b7ea6664044060b1

  • SHA256

    99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3

  • SHA512

    006ecbbcb0ad52bf1967848da3e1f460ea1b64ecc5259c95e9ab827183e0a70517f94642c0b9c93906f3bd55241cef6263d220f84b07064e6f6cedd6af61caa3

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZZ:P5eznsjsguGDFqGZ2rDL/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3

    • Size

      116KB

    • MD5

      01fd7c260144e43f934a18b6ebdec174

    • SHA1

      56046e01bf3040b681cada52b7ea6664044060b1

    • SHA256

      99ece485b86961597abf8a710eb239f12fc1d7952cf4cb7e5c5df997e1dd96a3

    • SHA512

      006ecbbcb0ad52bf1967848da3e1f460ea1b64ecc5259c95e9ab827183e0a70517f94642c0b9c93906f3bd55241cef6263d220f84b07064e6f6cedd6af61caa3

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZZ:P5eznsjsguGDFqGZ2rDL/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks