General

  • Target

    dbc71e424441861f44f8eff7b9039a9374b9ec41db3cbeb80e953ff10e64368e

  • Size

    114KB

  • Sample

    241205-dygk2sslfl

  • MD5

    a1a801472861865e1d50c1ed1192c4c6

  • SHA1

    77895715f30bfd6cfc2bcd6c4469efe7e4f9b7e9

  • SHA256

    dbc71e424441861f44f8eff7b9039a9374b9ec41db3cbeb80e953ff10e64368e

  • SHA512

    d5e0ab2265c44ded448495692e424001f0c08e69c2bffef88239c3d0e9b4a28c1be34b8a9250a7b8ffb93aa53fd1a6160b21e16c492fa839d4b32fd4a2a42d57

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vd+i:w5eznsjsguGDFqGx8egoxmO3rvki

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      dbc71e424441861f44f8eff7b9039a9374b9ec41db3cbeb80e953ff10e64368e

    • Size

      114KB

    • MD5

      a1a801472861865e1d50c1ed1192c4c6

    • SHA1

      77895715f30bfd6cfc2bcd6c4469efe7e4f9b7e9

    • SHA256

      dbc71e424441861f44f8eff7b9039a9374b9ec41db3cbeb80e953ff10e64368e

    • SHA512

      d5e0ab2265c44ded448495692e424001f0c08e69c2bffef88239c3d0e9b4a28c1be34b8a9250a7b8ffb93aa53fd1a6160b21e16c492fa839d4b32fd4a2a42d57

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vd+i:w5eznsjsguGDFqGx8egoxmO3rvki

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks