General

  • Target

    81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359N

  • Size

    113KB

  • Sample

    241025-qz3acs1fpn

  • MD5

    e861ff7cad7d40a53443e92985ae5cc0

  • SHA1

    76024e8e8e87eb879f5daa79be2e1512c9e30769

  • SHA256

    81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359

  • SHA512

    e15b361cb916a80416249dc2c21696d58223615cd73521988d2d0be1cc232194c21209f83a84d82762d429462b2545057babd070d9c580f87fadc49ea0fe8b22

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RQ:w5eznsjsguGDFqGx8egoxmO3rRQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359N

    • Size

      113KB

    • MD5

      e861ff7cad7d40a53443e92985ae5cc0

    • SHA1

      76024e8e8e87eb879f5daa79be2e1512c9e30769

    • SHA256

      81c14b87edf38378b76af207724449cf77f14d71004a3848c0f859749baa2359

    • SHA512

      e15b361cb916a80416249dc2c21696d58223615cd73521988d2d0be1cc232194c21209f83a84d82762d429462b2545057babd070d9c580f87fadc49ea0fe8b22

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RQ:w5eznsjsguGDFqGx8egoxmO3rRQ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks