General

  • Target

    17e5e3705fa7acd98e7a0dee49def5f0.bin

  • Size

    62KB

  • Sample

    240802-bywnvsxfqp

  • MD5

    df369417a08457073bcc5c827594e708

  • SHA1

    48d949450215a817ab0b7bc0a2e2738f3ba0cfda

  • SHA256

    f39b0ae513867bef47f71f8a9ae23d6484a9b2e9e04395c80c20f23076977557

  • SHA512

    da98b30df2ad6609503d57f03768a08aa1b2124d07d39599c827c3e1d7cea66dd89d4fc0004a2697925379def6b029340c10cf4d43ee207749311fec2984283e

  • SSDEEP

    1536:mujSWANx+ftwzGgu8h/d89BNOUVMwEEjspusR/:3jSWexfxu8h4dmwEEjGus5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      e2e6e72e4178791e6741a7125f941e337f7ab9457db68dd4be3f6bfe36ac1d4d.exe

    • Size

      116KB

    • MD5

      17e5e3705fa7acd98e7a0dee49def5f0

    • SHA1

      257ba49074bbcf2e216907dd5b8b07edb63af736

    • SHA256

      e2e6e72e4178791e6741a7125f941e337f7ab9457db68dd4be3f6bfe36ac1d4d

    • SHA512

      6e163d2ffaa71e44859dae33884ca87b8ff60a0457f10fd4877253e4e9d0fafba6535e18cc8977e9dc4f0791803808c907995e07bca2db88c46790a969a22461

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMdeV:P5eznsjsguGDFqGZ2r8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks