General

  • Target

    251d47ff1386c6273c43601cd4a1f4a0N

  • Size

    119KB

  • Sample

    240913-3je64sverj

  • MD5

    251d47ff1386c6273c43601cd4a1f4a0

  • SHA1

    42dde20152525fc8e9f0bbcdd85e311427fead6a

  • SHA256

    eced7b063a64a23060ba6d6830d96dfa21e671a0c25a40820cc271cba7a55c1d

  • SHA512

    897a27999ea9585d27cc68c73e79c2518ae9f1854c4fff8620c173ef581025f79c4722f666ea2afc6a1ca6798dcf3e02f04859e3687559d412cbe14f6db7ec8a

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14FOg:P5eznsjsguGDFqGZ2rDL14FOg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      251d47ff1386c6273c43601cd4a1f4a0N

    • Size

      119KB

    • MD5

      251d47ff1386c6273c43601cd4a1f4a0

    • SHA1

      42dde20152525fc8e9f0bbcdd85e311427fead6a

    • SHA256

      eced7b063a64a23060ba6d6830d96dfa21e671a0c25a40820cc271cba7a55c1d

    • SHA512

      897a27999ea9585d27cc68c73e79c2518ae9f1854c4fff8620c173ef581025f79c4722f666ea2afc6a1ca6798dcf3e02f04859e3687559d412cbe14f6db7ec8a

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14FOg:P5eznsjsguGDFqGZ2rDL14FOg

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks