General

  • Target

    e92558ae38e7e4265d09e8c75eea1fe0N.exe

  • Size

    118KB

  • Sample

    240816-j8glpavakb

  • MD5

    e92558ae38e7e4265d09e8c75eea1fe0

  • SHA1

    5de2f64c6126771c1b1b1c7e2441e709bd008a97

  • SHA256

    3d90e73d4a2d7b46de5897b1db7fdbca33b49e713bd215743f76d582b547a230

  • SHA512

    2cd8e1cc4eee377b92cb0d8ab883a03355929fad404863c6e77276d0be4c8bdf232a4f7dc866e3c36ae38faca1f25ed141ddeb97c1ca08d5367bb71e31cd5bab

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14FgE:P5eznsjsguGDFqGZ2rDL14FgE

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      e92558ae38e7e4265d09e8c75eea1fe0N.exe

    • Size

      118KB

    • MD5

      e92558ae38e7e4265d09e8c75eea1fe0

    • SHA1

      5de2f64c6126771c1b1b1c7e2441e709bd008a97

    • SHA256

      3d90e73d4a2d7b46de5897b1db7fdbca33b49e713bd215743f76d582b547a230

    • SHA512

      2cd8e1cc4eee377b92cb0d8ab883a03355929fad404863c6e77276d0be4c8bdf232a4f7dc866e3c36ae38faca1f25ed141ddeb97c1ca08d5367bb71e31cd5bab

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14FgE:P5eznsjsguGDFqGZ2rDL14FgE

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks