General

  • Target

    b696d6a0ee5f42c2161f46fca4f61040N.exe

  • Size

    111KB

  • Sample

    240814-bn62vatdre

  • MD5

    b696d6a0ee5f42c2161f46fca4f61040

  • SHA1

    18ada5e9e632487aacd8f6608697f171a8da914d

  • SHA256

    99928c4db34d0eef8bbc62f5e5b99af78dbbe2a144dcfa2eaf6c7feec9ebac7c

  • SHA512

    fbc346e9437359f9a25d191994d63a7363097d8fbc3d308a59493a32eff0934077b782ccf75a6b1eb250307481c0fbc8e88a09a0ff4226da839ea3a7bb28564c

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73n:w5eznsjsguGDFqGx8egoxmO3rn

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      b696d6a0ee5f42c2161f46fca4f61040N.exe

    • Size

      111KB

    • MD5

      b696d6a0ee5f42c2161f46fca4f61040

    • SHA1

      18ada5e9e632487aacd8f6608697f171a8da914d

    • SHA256

      99928c4db34d0eef8bbc62f5e5b99af78dbbe2a144dcfa2eaf6c7feec9ebac7c

    • SHA512

      fbc346e9437359f9a25d191994d63a7363097d8fbc3d308a59493a32eff0934077b782ccf75a6b1eb250307481c0fbc8e88a09a0ff4226da839ea3a7bb28564c

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73n:w5eznsjsguGDFqGx8egoxmO3rn

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks