General

  • Target

    3c0659326c9db90722af36eb71ced388.exe

  • Size

    114KB

  • Sample

    241204-ntewrstrfs

  • MD5

    3c0659326c9db90722af36eb71ced388

  • SHA1

    cfa1a1423f456664f02c68c6cc85793a8cb09037

  • SHA256

    a88ab1054e6a52a003c986f8814fe6936a85cf1416eb1cbc61e955be42c84d05

  • SHA512

    4d07566d9daceccd2e78d4fa35415a92b779b7496ef0c2f30adc6e7f68d94ffb6c60f5847ce2b059e393dd114541ef529d96fe067c95dffca5783341b31f60c1

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vrm:w5eznsjsguGDFqGx8egoxmO3rvC

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      3c0659326c9db90722af36eb71ced388.exe

    • Size

      114KB

    • MD5

      3c0659326c9db90722af36eb71ced388

    • SHA1

      cfa1a1423f456664f02c68c6cc85793a8cb09037

    • SHA256

      a88ab1054e6a52a003c986f8814fe6936a85cf1416eb1cbc61e955be42c84d05

    • SHA512

      4d07566d9daceccd2e78d4fa35415a92b779b7496ef0c2f30adc6e7f68d94ffb6c60f5847ce2b059e393dd114541ef529d96fe067c95dffca5783341b31f60c1

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vrm:w5eznsjsguGDFqGx8egoxmO3rvC

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks