General

  • Target

    41b47975c4ff5e6765136d1d7eb4f920N

  • Size

    109KB

  • Sample

    240910-w2l9tayhlb

  • MD5

    41b47975c4ff5e6765136d1d7eb4f920

  • SHA1

    c23bd9b148973fe186f64967b624afd20d9b436b

  • SHA256

    5ba1bda0c7717941dcd453bc2fd31dde89a70f9983e741bb33a475bbe679cc40

  • SHA512

    7aafac2dd8a3139525d10446978c9347ac1c15f572cd8dfe53ad1d300da6495515fd33eb28438eddb2d7745c24a558214a999c6bcbf837054c63bc4efc456a65

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73jj:w5eznsjsguGDFqGx8egoxmO3rf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      41b47975c4ff5e6765136d1d7eb4f920N

    • Size

      109KB

    • MD5

      41b47975c4ff5e6765136d1d7eb4f920

    • SHA1

      c23bd9b148973fe186f64967b624afd20d9b436b

    • SHA256

      5ba1bda0c7717941dcd453bc2fd31dde89a70f9983e741bb33a475bbe679cc40

    • SHA512

      7aafac2dd8a3139525d10446978c9347ac1c15f572cd8dfe53ad1d300da6495515fd33eb28438eddb2d7745c24a558214a999c6bcbf837054c63bc4efc456a65

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73jj:w5eznsjsguGDFqGx8egoxmO3rf

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks