General

  • Target

    e2e6e72e4178791e6741a7125f941e337f7ab9457db68dd4be3f6bfe36ac1d4d.exe

  • Size

    116KB

  • Sample

    240801-csdrjawhkk

  • MD5

    17e5e3705fa7acd98e7a0dee49def5f0

  • SHA1

    257ba49074bbcf2e216907dd5b8b07edb63af736

  • SHA256

    e2e6e72e4178791e6741a7125f941e337f7ab9457db68dd4be3f6bfe36ac1d4d

  • SHA512

    6e163d2ffaa71e44859dae33884ca87b8ff60a0457f10fd4877253e4e9d0fafba6535e18cc8977e9dc4f0791803808c907995e07bca2db88c46790a969a22461

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMdeV:P5eznsjsguGDFqGZ2r8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      e2e6e72e4178791e6741a7125f941e337f7ab9457db68dd4be3f6bfe36ac1d4d.exe

    • Size

      116KB

    • MD5

      17e5e3705fa7acd98e7a0dee49def5f0

    • SHA1

      257ba49074bbcf2e216907dd5b8b07edb63af736

    • SHA256

      e2e6e72e4178791e6741a7125f941e337f7ab9457db68dd4be3f6bfe36ac1d4d

    • SHA512

      6e163d2ffaa71e44859dae33884ca87b8ff60a0457f10fd4877253e4e9d0fafba6535e18cc8977e9dc4f0791803808c907995e07bca2db88c46790a969a22461

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMdeV:P5eznsjsguGDFqGZ2r8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks