General

  • Target

    0c7db201069bf8d9265ddb14bab60973ef69bd3b399919700f66f1fcfac625da

  • Size

    113KB

  • Sample

    240926-w6895svake

  • MD5

    a2e6a6bcb98ca60ea56fb90293849555

  • SHA1

    ea3656fd46db09ae4864c291f9e902b4b8bd3116

  • SHA256

    0c7db201069bf8d9265ddb14bab60973ef69bd3b399919700f66f1fcfac625da

  • SHA512

    2caab6316cf25d11b0c6987d97ba3ec05fb828feab52516e12d6153e71fe2a38f9482969096236b59fa984b60dafb890146056c26260eacb4d3c5dad82874a16

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vw:w5eznsjsguGDFqGx8egoxmO3rvw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      0c7db201069bf8d9265ddb14bab60973ef69bd3b399919700f66f1fcfac625da

    • Size

      113KB

    • MD5

      a2e6a6bcb98ca60ea56fb90293849555

    • SHA1

      ea3656fd46db09ae4864c291f9e902b4b8bd3116

    • SHA256

      0c7db201069bf8d9265ddb14bab60973ef69bd3b399919700f66f1fcfac625da

    • SHA512

      2caab6316cf25d11b0c6987d97ba3ec05fb828feab52516e12d6153e71fe2a38f9482969096236b59fa984b60dafb890146056c26260eacb4d3c5dad82874a16

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vw:w5eznsjsguGDFqGx8egoxmO3rvw

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks