General

  • Target

    5b3259968403f391ff713d9530cb9c1ad8a2b7fdc80151846ceb705b94077241N.exe

  • Size

    114KB

  • Sample

    241220-bglsbswkdq

  • MD5

    e254acbfcf1f4397c82f56e015f1e850

  • SHA1

    2b475d4f685deb8b677067aaae51043130726be4

  • SHA256

    5b3259968403f391ff713d9530cb9c1ad8a2b7fdc80151846ceb705b94077241

  • SHA512

    79a9e556e0621d0225ebf3c51d46488c5e3e68d06f56564f0dc12b7747e3e9bcd24833ea221970e2a6f95f35dbe80b9890ada416204dbb8a9dd6fd3510b72048

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vr/:w5eznsjsguGDFqGx8egoxmO3rvT

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      5b3259968403f391ff713d9530cb9c1ad8a2b7fdc80151846ceb705b94077241N.exe

    • Size

      114KB

    • MD5

      e254acbfcf1f4397c82f56e015f1e850

    • SHA1

      2b475d4f685deb8b677067aaae51043130726be4

    • SHA256

      5b3259968403f391ff713d9530cb9c1ad8a2b7fdc80151846ceb705b94077241

    • SHA512

      79a9e556e0621d0225ebf3c51d46488c5e3e68d06f56564f0dc12b7747e3e9bcd24833ea221970e2a6f95f35dbe80b9890ada416204dbb8a9dd6fd3510b72048

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vr/:w5eznsjsguGDFqGx8egoxmO3rvT

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks