General

  • Target

    Trojan.MSIL.Formbook.EE.MTB-1ebe4204410e273fe3c1512725ae8d5f7b9fd13043368eb34f64b60122def206N

  • Size

    117KB

  • Sample

    240916-wn234ssajf

  • MD5

    337dd3a669fe7b5df98ad7701d6a35b0

  • SHA1

    74144c494db29f1cc775e4953cb6816571e9868a

  • SHA256

    1ebe4204410e273fe3c1512725ae8d5f7b9fd13043368eb34f64b60122def206

  • SHA512

    c60735104bef63236bccc0bf346b97305aa268c2f795598286bbbc556aa0499ec8655434d46fe59000f7478b5039b41d68fcbe201169c82df7bcc9a27cc6a754

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLW4:P5eznsjsguGDFqGZ2rDLX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      Trojan.MSIL.Formbook.EE.MTB-1ebe4204410e273fe3c1512725ae8d5f7b9fd13043368eb34f64b60122def206N

    • Size

      117KB

    • MD5

      337dd3a669fe7b5df98ad7701d6a35b0

    • SHA1

      74144c494db29f1cc775e4953cb6816571e9868a

    • SHA256

      1ebe4204410e273fe3c1512725ae8d5f7b9fd13043368eb34f64b60122def206

    • SHA512

      c60735104bef63236bccc0bf346b97305aa268c2f795598286bbbc556aa0499ec8655434d46fe59000f7478b5039b41d68fcbe201169c82df7bcc9a27cc6a754

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLW4:P5eznsjsguGDFqGZ2rDLX

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks