General

  • Target

    3fae182c31718a026d9983e5b12512173ff88402192b0de12e457855dde1f7e5N.exe

  • Size

    114KB

  • Sample

    241123-kpa58sykdn

  • MD5

    94829de86217417809ef4fc2d1c57f30

  • SHA1

    c549cb4ae63e691cdb47cba6f9771a955e869f99

  • SHA256

    3fae182c31718a026d9983e5b12512173ff88402192b0de12e457855dde1f7e5

  • SHA512

    7dbdf089fd459edaf0a7974423e8cc63448c7322cc98a9bf4592aa167b8374cf51b140e2d3cb6fc159fed7d279eb6327d1952331958337703ae000ba219d140e

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73Ro:w5eznsjsguGDFqGx8egoxmO3rRo

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      3fae182c31718a026d9983e5b12512173ff88402192b0de12e457855dde1f7e5N.exe

    • Size

      114KB

    • MD5

      94829de86217417809ef4fc2d1c57f30

    • SHA1

      c549cb4ae63e691cdb47cba6f9771a955e869f99

    • SHA256

      3fae182c31718a026d9983e5b12512173ff88402192b0de12e457855dde1f7e5

    • SHA512

      7dbdf089fd459edaf0a7974423e8cc63448c7322cc98a9bf4592aa167b8374cf51b140e2d3cb6fc159fed7d279eb6327d1952331958337703ae000ba219d140e

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73Ro:w5eznsjsguGDFqGx8egoxmO3rRo

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks