General

  • Target

    27bac3f5b14c8cdb8c04868eb620eb562fb9c0d9e417a138c8b82b5f737b9eeaN.exe

  • Size

    115KB

  • Sample

    241222-efpdlssmdv

  • MD5

    baa3cc354ead1c28e8ef30d70f4229e0

  • SHA1

    f1af7c164787c5188e738348ed28b5b7a6a6521b

  • SHA256

    27bac3f5b14c8cdb8c04868eb620eb562fb9c0d9e417a138c8b82b5f737b9eea

  • SHA512

    9d8b315a7e2f04f722e70d379508ee2b9b8a36e09efd3635393b8f43c6bc1a69077d617ceed55ac99ba27b38f8faf6d762bad9680f81ed8e3cffed0f5092a031

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73R3:w5eznsjsguGDFqGx8egoxmO3rR3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      27bac3f5b14c8cdb8c04868eb620eb562fb9c0d9e417a138c8b82b5f737b9eeaN.exe

    • Size

      115KB

    • MD5

      baa3cc354ead1c28e8ef30d70f4229e0

    • SHA1

      f1af7c164787c5188e738348ed28b5b7a6a6521b

    • SHA256

      27bac3f5b14c8cdb8c04868eb620eb562fb9c0d9e417a138c8b82b5f737b9eea

    • SHA512

      9d8b315a7e2f04f722e70d379508ee2b9b8a36e09efd3635393b8f43c6bc1a69077d617ceed55ac99ba27b38f8faf6d762bad9680f81ed8e3cffed0f5092a031

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73R3:w5eznsjsguGDFqGx8egoxmO3rR3

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks