General

  • Target

    6ad1c6ee1bd94e8f745584f57e7628a4747dd784441e63464166971508c4e737.exe

  • Size

    115KB

  • Sample

    241222-sg4rksslek

  • MD5

    898a790672195b8f15d6216d5d6b777c

  • SHA1

    3d50099132b42da69f458e99af9abf3f893fb4a7

  • SHA256

    6ad1c6ee1bd94e8f745584f57e7628a4747dd784441e63464166971508c4e737

  • SHA512

    088411c42aa10b71cc217087b3ed93fcf06b5066f9d36e81277b3ca8afcc11521d728f1485a726fd96a039c0f7dec3406fac325dfac9916f916e86f76ad8a953

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73R9:w5eznsjsguGDFqGx8egoxmO3rR9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      6ad1c6ee1bd94e8f745584f57e7628a4747dd784441e63464166971508c4e737.exe

    • Size

      115KB

    • MD5

      898a790672195b8f15d6216d5d6b777c

    • SHA1

      3d50099132b42da69f458e99af9abf3f893fb4a7

    • SHA256

      6ad1c6ee1bd94e8f745584f57e7628a4747dd784441e63464166971508c4e737

    • SHA512

      088411c42aa10b71cc217087b3ed93fcf06b5066f9d36e81277b3ca8afcc11521d728f1485a726fd96a039c0f7dec3406fac325dfac9916f916e86f76ad8a953

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73R9:w5eznsjsguGDFqGx8egoxmO3rR9

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks