General

  • Target

    fdde1f86cb217009a3bf9f5a10203f1c1b4ccebdef67d8c0422853ec1013047cN

  • Size

    116KB

  • Sample

    241001-jm137sybqj

  • MD5

    b471fd848cbf9696c5e45097c87b3460

  • SHA1

    9e8a47bcdb574d4dbbcd70df0c99a61efde67a37

  • SHA256

    fdde1f86cb217009a3bf9f5a10203f1c1b4ccebdef67d8c0422853ec1013047c

  • SHA512

    bbe50ed240d9279bda40095c1a1b310e84e3e8189e59563bb753d86bce8a1f0fa32f0f00ce398541b616958847394b0e57f08ece25c04abac643ecb958d4ea37

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLi:P5eznsjsguGDFqGZ2rDLi

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      fdde1f86cb217009a3bf9f5a10203f1c1b4ccebdef67d8c0422853ec1013047cN

    • Size

      116KB

    • MD5

      b471fd848cbf9696c5e45097c87b3460

    • SHA1

      9e8a47bcdb574d4dbbcd70df0c99a61efde67a37

    • SHA256

      fdde1f86cb217009a3bf9f5a10203f1c1b4ccebdef67d8c0422853ec1013047c

    • SHA512

      bbe50ed240d9279bda40095c1a1b310e84e3e8189e59563bb753d86bce8a1f0fa32f0f00ce398541b616958847394b0e57f08ece25c04abac643ecb958d4ea37

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLi:P5eznsjsguGDFqGZ2rDLi

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks