General

  • Target

    d922e0deac60a6afb2d0c9d82b297bbab9055db696ff15c384b124c10695fcf9.exe

  • Size

    114KB

  • Sample

    241222-tfvyqasphw

  • MD5

    4e707e7a4eafe710fde1231789950810

  • SHA1

    1a9599221260f8e4e55811a5a6e5fd43d167ae2f

  • SHA256

    d922e0deac60a6afb2d0c9d82b297bbab9055db696ff15c384b124c10695fcf9

  • SHA512

    c33771475d56625cc93c5f2e746ca51b3ccecaafb386774e742d3abc829a7f44d54076c78f3a5747cd071ae78c1d2f341be6e47a2878d64562ba5117c37c8de5

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vdZ:w5eznsjsguGDFqGx8egoxmO3rvz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      d922e0deac60a6afb2d0c9d82b297bbab9055db696ff15c384b124c10695fcf9.exe

    • Size

      114KB

    • MD5

      4e707e7a4eafe710fde1231789950810

    • SHA1

      1a9599221260f8e4e55811a5a6e5fd43d167ae2f

    • SHA256

      d922e0deac60a6afb2d0c9d82b297bbab9055db696ff15c384b124c10695fcf9

    • SHA512

      c33771475d56625cc93c5f2e746ca51b3ccecaafb386774e742d3abc829a7f44d54076c78f3a5747cd071ae78c1d2f341be6e47a2878d64562ba5117c37c8de5

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73vdZ:w5eznsjsguGDFqGx8egoxmO3rvz

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks