General

  • Target

    41ce0fdba3de8ca8d948f4b82eb9d4f63397a5f8cc77ef8cefab1cce2f70c709.exe

  • Size

    116KB

  • Sample

    240619-s8lebashlh

  • MD5

    6b06d00c6ef29be4902f7f6f89f014ce

  • SHA1

    edea3d3f8ec67a057322fbb9446dee23239b7aec

  • SHA256

    41ce0fdba3de8ca8d948f4b82eb9d4f63397a5f8cc77ef8cefab1cce2f70c709

  • SHA512

    633daa202993249ce81eca756d9ac589aa0a56cb6d12485ec16fc5dbb1c0500b41a524954fcaf67c190d1e2bca9e22e6f07b8b2b083961efcea3cba1048bea0b

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLi:P5eznsjsguGDFqGZ2rDLi

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      41ce0fdba3de8ca8d948f4b82eb9d4f63397a5f8cc77ef8cefab1cce2f70c709.exe

    • Size

      116KB

    • MD5

      6b06d00c6ef29be4902f7f6f89f014ce

    • SHA1

      edea3d3f8ec67a057322fbb9446dee23239b7aec

    • SHA256

      41ce0fdba3de8ca8d948f4b82eb9d4f63397a5f8cc77ef8cefab1cce2f70c709

    • SHA512

      633daa202993249ce81eca756d9ac589aa0a56cb6d12485ec16fc5dbb1c0500b41a524954fcaf67c190d1e2bca9e22e6f07b8b2b083961efcea3cba1048bea0b

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLi:P5eznsjsguGDFqGZ2rDLi

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks