General

  • Target

    5054140f8650c862a10697b8f1e3ef9cb07e78359df6d0a3e645e5c8bf0efde1.exe

  • Size

    114KB

  • Sample

    241218-cxdmbszpek

  • MD5

    01147c2d8d629fb6a6902102f2513f01

  • SHA1

    21dbf1fa09d529fc00a598567449ca09f059f0ec

  • SHA256

    5054140f8650c862a10697b8f1e3ef9cb07e78359df6d0a3e645e5c8bf0efde1

  • SHA512

    0a7f6087ca037036c6295ddecc121a7d9c244a81da12515f16b6db81454a84a4f68054a6533bd0ea6fbf05131c26f679f9332b9b2d50d002669b434ae3a8c433

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vry:w5eznsjsguGDFqGx8egoxmO3rvm

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      5054140f8650c862a10697b8f1e3ef9cb07e78359df6d0a3e645e5c8bf0efde1.exe

    • Size

      114KB

    • MD5

      01147c2d8d629fb6a6902102f2513f01

    • SHA1

      21dbf1fa09d529fc00a598567449ca09f059f0ec

    • SHA256

      5054140f8650c862a10697b8f1e3ef9cb07e78359df6d0a3e645e5c8bf0efde1

    • SHA512

      0a7f6087ca037036c6295ddecc121a7d9c244a81da12515f16b6db81454a84a4f68054a6533bd0ea6fbf05131c26f679f9332b9b2d50d002669b434ae3a8c433

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vry:w5eznsjsguGDFqGx8egoxmO3rvm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks