General

  • Target

    34cf30a3e81a9749ccdc0a7034ef529b45dc583d10eaa38cfdf0c7608ea78f7f

  • Size

    117KB

  • Sample

    240825-zhcg2svhmk

  • MD5

    09b03fe67e5aa5599a9eced596d3cb98

  • SHA1

    cbcca89d01026acd46bd866d76a8048fd77c9efd

  • SHA256

    34cf30a3e81a9749ccdc0a7034ef529b45dc583d10eaa38cfdf0c7608ea78f7f

  • SHA512

    855044f13806bef7146f0861d134ff94bc36d8f07e9cba3629ceb00ec69062299c4ba64e726c8138b327c888cca83af918c208875b9b946540b83fd7925b8a3e

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLWx:P5eznsjsguGDFqGZ2rDLm

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      34cf30a3e81a9749ccdc0a7034ef529b45dc583d10eaa38cfdf0c7608ea78f7f

    • Size

      117KB

    • MD5

      09b03fe67e5aa5599a9eced596d3cb98

    • SHA1

      cbcca89d01026acd46bd866d76a8048fd77c9efd

    • SHA256

      34cf30a3e81a9749ccdc0a7034ef529b45dc583d10eaa38cfdf0c7608ea78f7f

    • SHA512

      855044f13806bef7146f0861d134ff94bc36d8f07e9cba3629ceb00ec69062299c4ba64e726c8138b327c888cca83af918c208875b9b946540b83fd7925b8a3e

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLWx:P5eznsjsguGDFqGZ2rDLm

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks