General

  • Target

    47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0

  • Size

    119KB

  • Sample

    241017-z64w7sxbnc

  • MD5

    9e1147254cac7797a097dd3a21454a40

  • SHA1

    c732f4e56bb53b88615542b5811be06a6975b76f

  • SHA256

    47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0

  • SHA512

    a0812f7f49165b2653a8c5f0f3e974ddf224b2f142e80a32b97a40f6d42efaf5f57b0231deea366071470d809aba10c48eb05bd296bb574bc9ddd8a9214cbaa6

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14Fgf:P5eznsjsguGDFqGZ2rDL14Fgf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0

    • Size

      119KB

    • MD5

      9e1147254cac7797a097dd3a21454a40

    • SHA1

      c732f4e56bb53b88615542b5811be06a6975b76f

    • SHA256

      47e8f52d61c1196ad37f34a79fda85c4a911eb34491e21d7ec6142f640bc3bb0

    • SHA512

      a0812f7f49165b2653a8c5f0f3e974ddf224b2f142e80a32b97a40f6d42efaf5f57b0231deea366071470d809aba10c48eb05bd296bb574bc9ddd8a9214cbaa6

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14Fgf:P5eznsjsguGDFqGZ2rDL14Fgf

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks