General

  • Target

    4ecf642efaacb2436c6c50d67b4c13b412223e03c288318b6dbd06f3f142cf59

  • Size

    112KB

  • Sample

    240828-1sdnjaxhrh

  • MD5

    66dc5e2f50b0127d751a38e7ee662559

  • SHA1

    3df32baf65a27c3e2be0913bf695cc9fabcd21ae

  • SHA256

    4ecf642efaacb2436c6c50d67b4c13b412223e03c288318b6dbd06f3f142cf59

  • SHA512

    52ae840cd96a4e47f20567d0e3ab0bd747ba59b04f52c3c738bf87a0f48b83464eb9a449640de2ad680bd6f64c58a922d64e5a62de81945e262751a54d28fcd1

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73r:w5eznsjsguGDFqGx8egoxmO3rr

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      4ecf642efaacb2436c6c50d67b4c13b412223e03c288318b6dbd06f3f142cf59

    • Size

      112KB

    • MD5

      66dc5e2f50b0127d751a38e7ee662559

    • SHA1

      3df32baf65a27c3e2be0913bf695cc9fabcd21ae

    • SHA256

      4ecf642efaacb2436c6c50d67b4c13b412223e03c288318b6dbd06f3f142cf59

    • SHA512

      52ae840cd96a4e47f20567d0e3ab0bd747ba59b04f52c3c738bf87a0f48b83464eb9a449640de2ad680bd6f64c58a922d64e5a62de81945e262751a54d28fcd1

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73r:w5eznsjsguGDFqGx8egoxmO3rr

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks