General

  • Target

    9c4a8754b33ce64ac8b9ad46c87eb992242a60342a58f6ff7f630b5916eadb26N.exe

  • Size

    114KB

  • Sample

    241221-2mybessnhn

  • MD5

    a70e9a0b6e54cdba31723ff0bb7f1050

  • SHA1

    861f0d312565f193d018fad53bfd309afc13800a

  • SHA256

    9c4a8754b33ce64ac8b9ad46c87eb992242a60342a58f6ff7f630b5916eadb26

  • SHA512

    fb08d3ba54ada5b588e2db6f35ce0d3001cc18f6782726149d5108f243bca4a172e5304ba8e801b57c150984c5f73cf169e8e3cfccf1c2f516b13db38f32b9ba

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vdb:w5eznsjsguGDFqGx8egoxmO3rvp

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      9c4a8754b33ce64ac8b9ad46c87eb992242a60342a58f6ff7f630b5916eadb26N.exe

    • Size

      114KB

    • MD5

      a70e9a0b6e54cdba31723ff0bb7f1050

    • SHA1

      861f0d312565f193d018fad53bfd309afc13800a

    • SHA256

      9c4a8754b33ce64ac8b9ad46c87eb992242a60342a58f6ff7f630b5916eadb26

    • SHA512

      fb08d3ba54ada5b588e2db6f35ce0d3001cc18f6782726149d5108f243bca4a172e5304ba8e801b57c150984c5f73cf169e8e3cfccf1c2f516b13db38f32b9ba

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vdb:w5eznsjsguGDFqGx8egoxmO3rvp

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks