General

  • Target

    a4536d89825433a01f2828cb9bef202df0caf3669efc55ac7fa6370b3d87411b

  • Size

    117KB

  • Sample

    240915-ascs5awaqa

  • MD5

    3f67a85bc93052e8818a0d67f14f8109

  • SHA1

    6ef0bd5d82a5af43964626c7feccea2aaadd60ec

  • SHA256

    a4536d89825433a01f2828cb9bef202df0caf3669efc55ac7fa6370b3d87411b

  • SHA512

    625676d2e804876d25c04718bd8f22ad15d4e7d16175b787c3e6ff102f690551f198f5e143ec5e80c7689eacf6b0b750c8e7bdad93fa07c9ee6498293c5398a1

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMIYAJ:P5eznsjsguGDFqGZ2rIY8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      a4536d89825433a01f2828cb9bef202df0caf3669efc55ac7fa6370b3d87411b

    • Size

      117KB

    • MD5

      3f67a85bc93052e8818a0d67f14f8109

    • SHA1

      6ef0bd5d82a5af43964626c7feccea2aaadd60ec

    • SHA256

      a4536d89825433a01f2828cb9bef202df0caf3669efc55ac7fa6370b3d87411b

    • SHA512

      625676d2e804876d25c04718bd8f22ad15d4e7d16175b787c3e6ff102f690551f198f5e143ec5e80c7689eacf6b0b750c8e7bdad93fa07c9ee6498293c5398a1

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMIYAJ:P5eznsjsguGDFqGZ2rIY8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks