General

  • Target

    4e49377627bdb3bc5412e6b7620df720N

  • Size

    116KB

  • Sample

    240914-hcxscs1bkp

  • MD5

    4e49377627bdb3bc5412e6b7620df720

  • SHA1

    c4cf7eac84cc21c1e86107e2accd5f3125063988

  • SHA256

    fa782fccfb9233890a5bfce7def3b8bae0ff44e0a1f01e54be4902540bfa76f1

  • SHA512

    935eb0500c7a2a2ef1482127e674acf38211f9e804c7faa3aaf5e65afc2184beecf4e17975811e168b045aea0f100ab992e8ac30303f93f31a1f3424339525d9

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLo:P5eznsjsguGDFqGZ2rDLo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      4e49377627bdb3bc5412e6b7620df720N

    • Size

      116KB

    • MD5

      4e49377627bdb3bc5412e6b7620df720

    • SHA1

      c4cf7eac84cc21c1e86107e2accd5f3125063988

    • SHA256

      fa782fccfb9233890a5bfce7def3b8bae0ff44e0a1f01e54be4902540bfa76f1

    • SHA512

      935eb0500c7a2a2ef1482127e674acf38211f9e804c7faa3aaf5e65afc2184beecf4e17975811e168b045aea0f100ab992e8ac30303f93f31a1f3424339525d9

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLo:P5eznsjsguGDFqGZ2rDLo

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks