General

  • Target

    f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe

  • Size

    120KB

  • Sample

    250113-azbjmsxkby

  • MD5

    d986b47402659be6080d4ed28b9f0875

  • SHA1

    db348146d329c59b7fe35a87d228db2b9e22b906

  • SHA256

    f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2

  • SHA512

    14e5258df799fd5c9f428b692def624063484933e788f2e05469bd281e5d2330928cd9a1f595f260dcd99b3713f49d371ebf09b0ee4282bc08edaf05b085fb3b

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVgd:P5eznsjsguGDFqGZ2rDLm

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2.exe

    • Size

      120KB

    • MD5

      d986b47402659be6080d4ed28b9f0875

    • SHA1

      db348146d329c59b7fe35a87d228db2b9e22b906

    • SHA256

      f3e72ad4740bcef1746ca93fdb0ee8d70f7c7f4aef0017aebed18173d6fcffe2

    • SHA512

      14e5258df799fd5c9f428b692def624063484933e788f2e05469bd281e5d2330928cd9a1f595f260dcd99b3713f49d371ebf09b0ee4282bc08edaf05b085fb3b

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVgd:P5eznsjsguGDFqGZ2rDLm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks