General

  • Target

    661ffa3a94091e6145e20ab9c8c172ef532b981b93c7deef9f0508250bab3a3bN

  • Size

    119KB

  • Sample

    241004-2l5dcazgmr

  • MD5

    3a4047aeee85f80d67182ead056273a0

  • SHA1

    c95c5b85e9a940f46cfe30fde0c19d4d0e6783a2

  • SHA256

    661ffa3a94091e6145e20ab9c8c172ef532b981b93c7deef9f0508250bab3a3b

  • SHA512

    94913b8058afef9537905f1d147de8078b14ab48cb57dc6d0daf09b0c2d30f92ca1ce121628954d23f3de5a45e307f76cf64eaade34c73715c0f3cafe8b3fd15

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14X3Y:P5eznsjsguGDFqGZ2rDL14X3Y

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      661ffa3a94091e6145e20ab9c8c172ef532b981b93c7deef9f0508250bab3a3bN

    • Size

      119KB

    • MD5

      3a4047aeee85f80d67182ead056273a0

    • SHA1

      c95c5b85e9a940f46cfe30fde0c19d4d0e6783a2

    • SHA256

      661ffa3a94091e6145e20ab9c8c172ef532b981b93c7deef9f0508250bab3a3b

    • SHA512

      94913b8058afef9537905f1d147de8078b14ab48cb57dc6d0daf09b0c2d30f92ca1ce121628954d23f3de5a45e307f76cf64eaade34c73715c0f3cafe8b3fd15

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14X3Y:P5eznsjsguGDFqGZ2rDL14X3Y

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks