General

  • Target

    dc2ceb535e34fd0e54e87cce63d3ef05d5987b4e367f2158293486e5e07377a5.exe

  • Size

    113KB

  • Sample

    241107-dwmz2svdkq

  • MD5

    7d77e5b9c5652a18f5b17db180acfb3b

  • SHA1

    89e6748c7b986bdcff0f6a7452e9e77c88d983b6

  • SHA256

    dc2ceb535e34fd0e54e87cce63d3ef05d5987b4e367f2158293486e5e07377a5

  • SHA512

    68aea0bca577f83cb7e9c8c50fea2292302d5a1b8a501494a8de3416ab949f7050054c0cb47cf4296db3a43c982124e817c4d0ae1c6571b6a55d2b7127aa4833

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73Rm:w5eznsjsguGDFqGx8egoxmO3rRm

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      dc2ceb535e34fd0e54e87cce63d3ef05d5987b4e367f2158293486e5e07377a5.exe

    • Size

      113KB

    • MD5

      7d77e5b9c5652a18f5b17db180acfb3b

    • SHA1

      89e6748c7b986bdcff0f6a7452e9e77c88d983b6

    • SHA256

      dc2ceb535e34fd0e54e87cce63d3ef05d5987b4e367f2158293486e5e07377a5

    • SHA512

      68aea0bca577f83cb7e9c8c50fea2292302d5a1b8a501494a8de3416ab949f7050054c0cb47cf4296db3a43c982124e817c4d0ae1c6571b6a55d2b7127aa4833

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73Rm:w5eznsjsguGDFqGx8egoxmO3rRm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks