General

  • Target

    1c7638a2389ecd433bb8e26aad0bbe4addbdb5b18b8fecfcb7a80c813bc24140

  • Size

    49KB

  • Sample

    240831-z2bpvswbke

  • MD5

    9bca202fded8039b20642850bf112249

  • SHA1

    e57b3599d1d649db40e82e7d92b7366e59dc11da

  • SHA256

    1c7638a2389ecd433bb8e26aad0bbe4addbdb5b18b8fecfcb7a80c813bc24140

  • SHA512

    b97d32f82adeb61c0b25e271efcae01d9b27e71b856868696477f7e9ca8d9cdd6bc595a9c2950cbd22c2179dfb526a28fb4b4ad3546429af065da02d89f66c6c

  • SSDEEP

    1536:uKUvftBy/54qTbASOHdBt0YGeRAPqJfLNG2W:aFBK4q4Nd0cDZbW

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      bc39b35fe49d2d8ffbfdbeb9f99c138919b2dc8acbfa8ee089c959b1270f1239

    • Size

      100KB

    • MD5

      3d5d5001a558f06c8013f35d0708817c

    • SHA1

      41642aec0b7ea7010c71ed512e952de75745112b

    • SHA256

      bc39b35fe49d2d8ffbfdbeb9f99c138919b2dc8acbfa8ee089c959b1270f1239

    • SHA512

      a69346e463a6bee2ac84b6596d3faa74d3d527c53a52759d61c5a80bead05ae8a4fd49533807e54ffa518c09ca8937424ceb6604797225de35133ab3f2fd6724

    • SSDEEP

      1536:WAp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4eP:d5eznsjsguGDFqG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks