General

  • Target

    44571de6b1432f2010a920a75ad4b0a2dccd8695c2878a43c0c807685b1bacda.exe

  • Size

    114KB

  • Sample

    241218-hxkzaszlhq

  • MD5

    a28a213101361c2c9a60ad3306024a16

  • SHA1

    289b5b12655f39e54b1039e761505e0278f877ff

  • SHA256

    44571de6b1432f2010a920a75ad4b0a2dccd8695c2878a43c0c807685b1bacda

  • SHA512

    79b9d2d83a0f5ed7d58c26dfada15a2e41e8ceac26450d75676b60c0baada1859d4241b522e378f0e7c687c4899363fbcd1114d03cc64c2f80d5d8178eff8acf

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RT:w5eznsjsguGDFqGx8egoxmO3rRT

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      44571de6b1432f2010a920a75ad4b0a2dccd8695c2878a43c0c807685b1bacda.exe

    • Size

      114KB

    • MD5

      a28a213101361c2c9a60ad3306024a16

    • SHA1

      289b5b12655f39e54b1039e761505e0278f877ff

    • SHA256

      44571de6b1432f2010a920a75ad4b0a2dccd8695c2878a43c0c807685b1bacda

    • SHA512

      79b9d2d83a0f5ed7d58c26dfada15a2e41e8ceac26450d75676b60c0baada1859d4241b522e378f0e7c687c4899363fbcd1114d03cc64c2f80d5d8178eff8acf

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RT:w5eznsjsguGDFqGx8egoxmO3rRT

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks