General

  • Target

    2d68b9d2faf8b3f90fee4e07ed869e78f73c026b71e0ebbee6ba0b059f6e9cb6

  • Size

    110KB

  • Sample

    240831-yhl6tasaqh

  • MD5

    128340f9e325a96d1e230f76aebd76fd

  • SHA1

    4cee579f4dd6e4fa6e96978d4583178ffa855394

  • SHA256

    2d68b9d2faf8b3f90fee4e07ed869e78f73c026b71e0ebbee6ba0b059f6e9cb6

  • SHA512

    c26f48ef15f7bc2c2b8eda33611a8c8cd22e9aaeb77ed11dd1509a2c2b96d081233c34926408fd4f62b0ab8cbe5a9e8c42cf54f914fe9b35c9ce84a5d5f38e6b

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73L2:w5eznsjsguGDFqGx8egoxmO3rL2

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      2d68b9d2faf8b3f90fee4e07ed869e78f73c026b71e0ebbee6ba0b059f6e9cb6

    • Size

      110KB

    • MD5

      128340f9e325a96d1e230f76aebd76fd

    • SHA1

      4cee579f4dd6e4fa6e96978d4583178ffa855394

    • SHA256

      2d68b9d2faf8b3f90fee4e07ed869e78f73c026b71e0ebbee6ba0b059f6e9cb6

    • SHA512

      c26f48ef15f7bc2c2b8eda33611a8c8cd22e9aaeb77ed11dd1509a2c2b96d081233c34926408fd4f62b0ab8cbe5a9e8c42cf54f914fe9b35c9ce84a5d5f38e6b

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73L2:w5eznsjsguGDFqGx8egoxmO3rL2

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks