General

  • Target

    41b408aa63dfbb34c93d61206de020607822c3809efd07f006f07780c15f8a1cN

  • Size

    120KB

  • Sample

    241101-zcy4vsvepg

  • MD5

    b15f2e47a62128a678121c801412bd20

  • SHA1

    57d9f47b977b32fad210569fe619309f9ccb0b55

  • SHA256

    41b408aa63dfbb34c93d61206de020607822c3809efd07f006f07780c15f8a1c

  • SHA512

    9f001801c0894b57e991fe3cd7312679c8d0f094b9b541c867cff1969b97b198ffe3dd4d2b85c13fef3bb276f50e52df8187f4a8506bb9c2e8f361a558cd7c0e

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14FgOC:P5eznsjsguGDFqGZ2rDL14FgX

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      41b408aa63dfbb34c93d61206de020607822c3809efd07f006f07780c15f8a1cN

    • Size

      120KB

    • MD5

      b15f2e47a62128a678121c801412bd20

    • SHA1

      57d9f47b977b32fad210569fe619309f9ccb0b55

    • SHA256

      41b408aa63dfbb34c93d61206de020607822c3809efd07f006f07780c15f8a1c

    • SHA512

      9f001801c0894b57e991fe3cd7312679c8d0f094b9b541c867cff1969b97b198ffe3dd4d2b85c13fef3bb276f50e52df8187f4a8506bb9c2e8f361a558cd7c0e

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDL14FgOC:P5eznsjsguGDFqGZ2rDL14FgX

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks