General

  • Target

    88b48f6c8b81bf26f19f28d1d1168de2d837074c890ee462dc62ec33678bec3c

  • Size

    119KB

  • Sample

    241225-akjaya1phz

  • MD5

    05f40f60d5c78afbe9f60851981901ce

  • SHA1

    72144382c51f178ff25868c8d73ae411c2fd000e

  • SHA256

    88b48f6c8b81bf26f19f28d1d1168de2d837074c890ee462dc62ec33678bec3c

  • SHA512

    7d06792cfdb3af53a4b331aac90007a2c809e6d019ce6d5e03b053858635dc9fa8df00d14239a96efc721295ffbf0e7128998dac2f21a5fd806d3efdd72583a6

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVg4:P5eznsjsguGDFqGZ2rDLZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      88b48f6c8b81bf26f19f28d1d1168de2d837074c890ee462dc62ec33678bec3c

    • Size

      119KB

    • MD5

      05f40f60d5c78afbe9f60851981901ce

    • SHA1

      72144382c51f178ff25868c8d73ae411c2fd000e

    • SHA256

      88b48f6c8b81bf26f19f28d1d1168de2d837074c890ee462dc62ec33678bec3c

    • SHA512

      7d06792cfdb3af53a4b331aac90007a2c809e6d019ce6d5e03b053858635dc9fa8df00d14239a96efc721295ffbf0e7128998dac2f21a5fd806d3efdd72583a6

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVg4:P5eznsjsguGDFqGZ2rDLZ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks