General

  • Target

    db94e7412a97baa53f7ea2aca96e40c0N.exe

  • Size

    118KB

  • Sample

    240901-pa3n6a1aka

  • MD5

    db94e7412a97baa53f7ea2aca96e40c0

  • SHA1

    7664916ef4b3360cba4f9991e483c4bc3b2bd0c2

  • SHA256

    a48ab371ed157137d3e8ba264ff50991b12e1c5f07e54ea9273621113f93220a

  • SHA512

    9956bd649515959618f6e36415987f2d4d5db4a4eecfe3d5c38038bb021925f4998e0763369f11c4d2c3904f050bff639d1645c60c32c1d810a55fa962254e71

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZlfg:P5eznsjsguGDFqGZ2rDLo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      db94e7412a97baa53f7ea2aca96e40c0N.exe

    • Size

      118KB

    • MD5

      db94e7412a97baa53f7ea2aca96e40c0

    • SHA1

      7664916ef4b3360cba4f9991e483c4bc3b2bd0c2

    • SHA256

      a48ab371ed157137d3e8ba264ff50991b12e1c5f07e54ea9273621113f93220a

    • SHA512

      9956bd649515959618f6e36415987f2d4d5db4a4eecfe3d5c38038bb021925f4998e0763369f11c4d2c3904f050bff639d1645c60c32c1d810a55fa962254e71

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLZlfg:P5eznsjsguGDFqGZ2rDLo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks