General

  • Target

    25f669ea146d8f2c977320f30656e2dd192147dc8c1760b6dcc028eb4ff37bffN

  • Size

    115KB

  • Sample

    241106-npfmhaylf1

  • MD5

    23fcf061055a57bff56bf1cb8c39ba00

  • SHA1

    7333eb694dff7292c836aa4cac34c3fe24ac3df8

  • SHA256

    25f669ea146d8f2c977320f30656e2dd192147dc8c1760b6dcc028eb4ff37bff

  • SHA512

    c1efc0bd869c7ed2d302ce2bc31521bedf0270be05e1f7838c9746387549d3273160f2b9f36708aa474cbbad353afa8dac288b39b569f03cb30eafd230f6c5f9

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMdeRmf:P5eznsjsguGDFqGZ2rc+

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      25f669ea146d8f2c977320f30656e2dd192147dc8c1760b6dcc028eb4ff37bffN

    • Size

      115KB

    • MD5

      23fcf061055a57bff56bf1cb8c39ba00

    • SHA1

      7333eb694dff7292c836aa4cac34c3fe24ac3df8

    • SHA256

      25f669ea146d8f2c977320f30656e2dd192147dc8c1760b6dcc028eb4ff37bff

    • SHA512

      c1efc0bd869c7ed2d302ce2bc31521bedf0270be05e1f7838c9746387549d3273160f2b9f36708aa474cbbad353afa8dac288b39b569f03cb30eafd230f6c5f9

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMdeRmf:P5eznsjsguGDFqGZ2rc+

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks