General

  • Target

    3d806b76a162faeed54de273a7c4965fbb18973aec1158cbbdf1efcd553c2a18.exe

  • Size

    113KB

  • Sample

    241125-csmz7synbj

  • MD5

    35114bc980d4d737f8f5e9c0eed79f91

  • SHA1

    c47cc7f5d9547c530babad777c45506bcd983ad0

  • SHA256

    3d806b76a162faeed54de273a7c4965fbb18973aec1158cbbdf1efcd553c2a18

  • SHA512

    705a1ecb277b048574ef4056f5131804b62f077ce1cb085e5dec40d558f97e95d882539f072402541aaa8e54c26768dea8d0f53fdb86ff9cc83b3b991158d17b

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vrU:w5eznsjsguGDFqGx8egoxmO3rvA

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      3d806b76a162faeed54de273a7c4965fbb18973aec1158cbbdf1efcd553c2a18.exe

    • Size

      113KB

    • MD5

      35114bc980d4d737f8f5e9c0eed79f91

    • SHA1

      c47cc7f5d9547c530babad777c45506bcd983ad0

    • SHA256

      3d806b76a162faeed54de273a7c4965fbb18973aec1158cbbdf1efcd553c2a18

    • SHA512

      705a1ecb277b048574ef4056f5131804b62f077ce1cb085e5dec40d558f97e95d882539f072402541aaa8e54c26768dea8d0f53fdb86ff9cc83b3b991158d17b

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vrU:w5eznsjsguGDFqGx8egoxmO3rvA

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks