General

  • Target

    dc47961a7054e98a62aaa994e879ee9becbf6096843c899bde226ecbb985f4bd.exe

  • Size

    111KB

  • Sample

    241028-he886szrbx

  • MD5

    279e02fea1b33cbdbfd612f5b2304429

  • SHA1

    94cafd8f8053465955869021d73126d81bcc30da

  • SHA256

    dc47961a7054e98a62aaa994e879ee9becbf6096843c899bde226ecbb985f4bd

  • SHA512

    c6d08dd2c475ef5461477571a694f0da21cd7a3659d13ad3910fcbb1a9f843ddc6e224a59045a67d219aa6e594a7f62177ab7309e077dc8298136d8f1974bdb7

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73U:w5eznsjsguGDFqGx8egoxmO3rU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      dc47961a7054e98a62aaa994e879ee9becbf6096843c899bde226ecbb985f4bd.exe

    • Size

      111KB

    • MD5

      279e02fea1b33cbdbfd612f5b2304429

    • SHA1

      94cafd8f8053465955869021d73126d81bcc30da

    • SHA256

      dc47961a7054e98a62aaa994e879ee9becbf6096843c899bde226ecbb985f4bd

    • SHA512

      c6d08dd2c475ef5461477571a694f0da21cd7a3659d13ad3910fcbb1a9f843ddc6e224a59045a67d219aa6e594a7f62177ab7309e077dc8298136d8f1974bdb7

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73U:w5eznsjsguGDFqGx8egoxmO3rU

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks