General

  • Target

    1a23a54df41d0cf4cfb9a6879f7cab61b1ecb0fae46dfb8a2f64361c6ae5846a

  • Size

    114KB

  • Sample

    240921-2yn7wsyfpl

  • MD5

    0233a24559d6825bdb7f0ec045758cae

  • SHA1

    b0161acb0a9bdfa28075e23b7d38ba0758fe99bc

  • SHA256

    1a23a54df41d0cf4cfb9a6879f7cab61b1ecb0fae46dfb8a2f64361c6ae5846a

  • SHA512

    51e6f62ac49df9f941cdbb1fab1232336b0409c592900e1bb871d3be6d0a808d3690c1f6fbdc15dbaf0ab110664bf92457ec98e863434bd120505473a8fa380f

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMM:P5eznsjsguGDFqGZ2rM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      1a23a54df41d0cf4cfb9a6879f7cab61b1ecb0fae46dfb8a2f64361c6ae5846a

    • Size

      114KB

    • MD5

      0233a24559d6825bdb7f0ec045758cae

    • SHA1

      b0161acb0a9bdfa28075e23b7d38ba0758fe99bc

    • SHA256

      1a23a54df41d0cf4cfb9a6879f7cab61b1ecb0fae46dfb8a2f64361c6ae5846a

    • SHA512

      51e6f62ac49df9f941cdbb1fab1232336b0409c592900e1bb871d3be6d0a808d3690c1f6fbdc15dbaf0ab110664bf92457ec98e863434bd120505473a8fa380f

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMM:P5eznsjsguGDFqGZ2rM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks