General

  • Target

    9e1ddb3ded2f795c2c3c2badbac73370N.exe

  • Size

    115KB

  • Sample

    240906-ywfaeswcke

  • MD5

    9e1ddb3ded2f795c2c3c2badbac73370

  • SHA1

    f5940b9df3d2d1f2335e6374aaed7dc7d27213ad

  • SHA256

    2e9983832a19f9b6dc791f57bff464dc53aa27d318e2b7a81bfc13fc1f579e09

  • SHA512

    6abde93ff7e97e250248a783740d7675f5689227c9dd0a3da0e5fbcdf84992ca3c64d80ee2745f1c87eaba826ea889075ad6d2d9366b48a80e705c5b0785d4df

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDX:P5eznsjsguGDFqGZ2rDX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      9e1ddb3ded2f795c2c3c2badbac73370N.exe

    • Size

      115KB

    • MD5

      9e1ddb3ded2f795c2c3c2badbac73370

    • SHA1

      f5940b9df3d2d1f2335e6374aaed7dc7d27213ad

    • SHA256

      2e9983832a19f9b6dc791f57bff464dc53aa27d318e2b7a81bfc13fc1f579e09

    • SHA512

      6abde93ff7e97e250248a783740d7675f5689227c9dd0a3da0e5fbcdf84992ca3c64d80ee2745f1c87eaba826ea889075ad6d2d9366b48a80e705c5b0785d4df

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDX:P5eznsjsguGDFqGZ2rDX

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks