General

  • Target

    de7ba0f8b28acfe56cf78d7f43fe79ea3732ae90576f509a05887514ff43b62fN.exe

  • Size

    113KB

  • Sample

    241111-2jzp3syckr

  • MD5

    a2208dc08acff4984edae1a282a6aea5

  • SHA1

    0031d2c9dfafbc1b58a9185c31a4d5983d0a72d2

  • SHA256

    46d830502f6f71e10e491a7d9c065be07923d57b948961c22e9df3b1fac1047f

  • SHA512

    676708b052a60d677609d668d53f62901c61d4151bf372e73b5cfac4587c8f5b43911eb4f91ad7eb34622a37fedb86a8412b2504d0bee58031bda8a1bf7aec5f

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73R/:w5eznsjsguGDFqGx8egoxmO3rR/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      de7ba0f8b28acfe56cf78d7f43fe79ea3732ae90576f509a05887514ff43b62fN.exe

    • Size

      113KB

    • MD5

      a2208dc08acff4984edae1a282a6aea5

    • SHA1

      0031d2c9dfafbc1b58a9185c31a4d5983d0a72d2

    • SHA256

      46d830502f6f71e10e491a7d9c065be07923d57b948961c22e9df3b1fac1047f

    • SHA512

      676708b052a60d677609d668d53f62901c61d4151bf372e73b5cfac4587c8f5b43911eb4f91ad7eb34622a37fedb86a8412b2504d0bee58031bda8a1bf7aec5f

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73R/:w5eznsjsguGDFqGx8egoxmO3rR/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks