General

  • Target

    fe4b9dfa13c9eace77f66a4a72b78120N.exe

  • Size

    117KB

  • Sample

    240830-hpzgqa1eqg

  • MD5

    fe4b9dfa13c9eace77f66a4a72b78120

  • SHA1

    007d70531181570848479a935df2d576bff0ec52

  • SHA256

    a43c49401a1a406b4a903402dda4bc69a804f5d105642a8417b9171aa3ec3010

  • SHA512

    31a6d1c76139f6b60bd2959d43bce6e9d33d3a2ee1b66acc5fad53fd0e979f8106d1fe8202b1a87f447e20eeb511b7c6feeadfc5399f21ea8df68f8bccb93edd

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMIYAO:P5eznsjsguGDFqGZ2rIYL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      fe4b9dfa13c9eace77f66a4a72b78120N.exe

    • Size

      117KB

    • MD5

      fe4b9dfa13c9eace77f66a4a72b78120

    • SHA1

      007d70531181570848479a935df2d576bff0ec52

    • SHA256

      a43c49401a1a406b4a903402dda4bc69a804f5d105642a8417b9171aa3ec3010

    • SHA512

      31a6d1c76139f6b60bd2959d43bce6e9d33d3a2ee1b66acc5fad53fd0e979f8106d1fe8202b1a87f447e20eeb511b7c6feeadfc5399f21ea8df68f8bccb93edd

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMIYAO:P5eznsjsguGDFqGZ2rIYL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks