General

  • Target

    9aafec84d6060dacd9a7c13f1cd7f37320d4215fdf64628c0098f97e1f8e855d.exe

  • Size

    114KB

  • Sample

    241219-mr9gxs1lf1

  • MD5

    1acd96209fcd1434a4a8a7095645b743

  • SHA1

    ec2ffcb8adaab965e45be5926063a9eb782e08df

  • SHA256

    9aafec84d6060dacd9a7c13f1cd7f37320d4215fdf64628c0098f97e1f8e855d

  • SHA512

    8ad229d4dcbf518655275dff7bd4f0baa5b4d1079f9344a8bc80f11815d114e2dc44ce8432bd3c67e7fb385c3f535274217cce04984279a7d90452f9c4ceb9df

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmS:w5eznsjsguGDFqGx8egoxmO3rRmS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      9aafec84d6060dacd9a7c13f1cd7f37320d4215fdf64628c0098f97e1f8e855d.exe

    • Size

      114KB

    • MD5

      1acd96209fcd1434a4a8a7095645b743

    • SHA1

      ec2ffcb8adaab965e45be5926063a9eb782e08df

    • SHA256

      9aafec84d6060dacd9a7c13f1cd7f37320d4215fdf64628c0098f97e1f8e855d

    • SHA512

      8ad229d4dcbf518655275dff7bd4f0baa5b4d1079f9344a8bc80f11815d114e2dc44ce8432bd3c67e7fb385c3f535274217cce04984279a7d90452f9c4ceb9df

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmS:w5eznsjsguGDFqGx8egoxmO3rRmS

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks