General

  • Target

    a93507f6e164357757614145eab5369377cbf84604f6665f297c5185cfef73cc

  • Size

    116KB

  • Sample

    240620-b1z43awcmn

  • MD5

    5089b7ad9ba48856cb3d1261ddbdd60d

  • SHA1

    57da4fa2d4f5436cd6eeb6e8042da1783848bcf6

  • SHA256

    a93507f6e164357757614145eab5369377cbf84604f6665f297c5185cfef73cc

  • SHA512

    c3217babb8e13e3e1f889c69f7900453896a47f4be973d939133782ea737f3cb1e698505b7e4fb998f9b8e35e36c6fea76588eef5256ae2849c763d6ddae62e7

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDIV:P5eznsjsguGDFqGZ2rDIV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      a93507f6e164357757614145eab5369377cbf84604f6665f297c5185cfef73cc

    • Size

      116KB

    • MD5

      5089b7ad9ba48856cb3d1261ddbdd60d

    • SHA1

      57da4fa2d4f5436cd6eeb6e8042da1783848bcf6

    • SHA256

      a93507f6e164357757614145eab5369377cbf84604f6665f297c5185cfef73cc

    • SHA512

      c3217babb8e13e3e1f889c69f7900453896a47f4be973d939133782ea737f3cb1e698505b7e4fb998f9b8e35e36c6fea76588eef5256ae2849c763d6ddae62e7

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDIV:P5eznsjsguGDFqGZ2rDIV

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks