General

  • Target

    3080e696f81fc5a955d2e350e0feb6108be42d7eb73e3f920666aa85d3d66785N.exe

  • Size

    113KB

  • Sample

    241118-hk7brs1gkr

  • MD5

    2a7b9256c31562a51a8bba4f56b581b0

  • SHA1

    237ef858c1f4e6c9a13b20803f612d4c63ffb788

  • SHA256

    3080e696f81fc5a955d2e350e0feb6108be42d7eb73e3f920666aa85d3d66785

  • SHA512

    e0bc6a506138a11c8e93d6e1f01855af0c9ad8c0d17c04bd39c2c5e900bfc37781ed7fdbd97a4a199e8682bf2cdde99aff09ae8148385ccb4661266f5950efd4

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vu:w5eznsjsguGDFqGx8egoxmO3rvu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      3080e696f81fc5a955d2e350e0feb6108be42d7eb73e3f920666aa85d3d66785N.exe

    • Size

      113KB

    • MD5

      2a7b9256c31562a51a8bba4f56b581b0

    • SHA1

      237ef858c1f4e6c9a13b20803f612d4c63ffb788

    • SHA256

      3080e696f81fc5a955d2e350e0feb6108be42d7eb73e3f920666aa85d3d66785

    • SHA512

      e0bc6a506138a11c8e93d6e1f01855af0c9ad8c0d17c04bd39c2c5e900bfc37781ed7fdbd97a4a199e8682bf2cdde99aff09ae8148385ccb4661266f5950efd4

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vu:w5eznsjsguGDFqGx8egoxmO3rvu

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks