General

  • Target

    a3485b702501c9c4d4b9dc1936f804e0N.exe

  • Size

    118KB

  • Sample

    240817-ft2rjayema

  • MD5

    a3485b702501c9c4d4b9dc1936f804e0

  • SHA1

    9dceabfaaa1f278ceb0628069cfb9adbd57b8c84

  • SHA256

    18675bf38698c988e1d10313cb7e5e14e70c57ed409774129738ed06f45221d7

  • SHA512

    8719e0a00fc4aef716baab23032dc22359d39fefb3a4805d281c42621388b407e45a3cfaa8982d92053fd2fd9fa121fe03bfb584eb76f9d16ad616aa0d228a92

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZ/6t:P5eznsjsguGDFqGZ2rDLZ/8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      a3485b702501c9c4d4b9dc1936f804e0N.exe

    • Size

      118KB

    • MD5

      a3485b702501c9c4d4b9dc1936f804e0

    • SHA1

      9dceabfaaa1f278ceb0628069cfb9adbd57b8c84

    • SHA256

      18675bf38698c988e1d10313cb7e5e14e70c57ed409774129738ed06f45221d7

    • SHA512

      8719e0a00fc4aef716baab23032dc22359d39fefb3a4805d281c42621388b407e45a3cfaa8982d92053fd2fd9fa121fe03bfb584eb76f9d16ad616aa0d228a92

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZ/6t:P5eznsjsguGDFqGZ2rDLZ/8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks