General

  • Target

    0a448f5a76f8760d27282d942f8e088b63bd323f9a1a064eb57bffcb6015355eN

  • Size

    112KB

  • Sample

    241001-zwn31azhlj

  • MD5

    fd8e85fa0fedbacb9e0207b7fcc3d360

  • SHA1

    c55f73cca110ca28ba73a0d106c54bb2aa311559

  • SHA256

    0a448f5a76f8760d27282d942f8e088b63bd323f9a1a064eb57bffcb6015355e

  • SHA512

    831b7506d5b2cf5732381e0505f04fe22982f0bbf3c003ebc6bda15183f0c7c62571a075cc1a02417cd6400bfa8d7c713f34418f7f88e7a6ab405abe57bb2d21

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73v/:w5eznsjsguGDFqGx8egoxmO3rv/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      0a448f5a76f8760d27282d942f8e088b63bd323f9a1a064eb57bffcb6015355eN

    • Size

      112KB

    • MD5

      fd8e85fa0fedbacb9e0207b7fcc3d360

    • SHA1

      c55f73cca110ca28ba73a0d106c54bb2aa311559

    • SHA256

      0a448f5a76f8760d27282d942f8e088b63bd323f9a1a064eb57bffcb6015355e

    • SHA512

      831b7506d5b2cf5732381e0505f04fe22982f0bbf3c003ebc6bda15183f0c7c62571a075cc1a02417cd6400bfa8d7c713f34418f7f88e7a6ab405abe57bb2d21

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73v/:w5eznsjsguGDFqGx8egoxmO3rv/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks