General

  • Target

    Trojan.MSIL.Formbook.EE.MTB-90067134519fe3a8071b6e4e7222beb95c7e50d78c44139dc128e13437b67c68N

  • Size

    116KB

  • Sample

    240916-x342pavhnc

  • MD5

    3955b3b4240331161d1acb07293c2010

  • SHA1

    e159f1af9169e5d716a5a6c90c70953982eadf0f

  • SHA256

    90067134519fe3a8071b6e4e7222beb95c7e50d78c44139dc128e13437b67c68

  • SHA512

    4b7d9c970e9f499f3f7e7bd71674bd01854142b2c3065b6feb4a202292b77e81fffe77b6eb9fe1d4d218bf9889bf4f9febebbe6116ba0acddb00f3784a08bdc1

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL7:P5eznsjsguGDFqGZ2rDL7

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      Trojan.MSIL.Formbook.EE.MTB-90067134519fe3a8071b6e4e7222beb95c7e50d78c44139dc128e13437b67c68N

    • Size

      116KB

    • MD5

      3955b3b4240331161d1acb07293c2010

    • SHA1

      e159f1af9169e5d716a5a6c90c70953982eadf0f

    • SHA256

      90067134519fe3a8071b6e4e7222beb95c7e50d78c44139dc128e13437b67c68

    • SHA512

      4b7d9c970e9f499f3f7e7bd71674bd01854142b2c3065b6feb4a202292b77e81fffe77b6eb9fe1d4d218bf9889bf4f9febebbe6116ba0acddb00f3784a08bdc1

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL7:P5eznsjsguGDFqGZ2rDL7

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks