General

  • Target

    da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N

  • Size

    120KB

  • Sample

    250113-nnjb1azqgv

  • MD5

    cf28cd2e4d302f8084428ae2154a1090

  • SHA1

    438ea7a74a106f663955707affc9ba1ccdf10d18

  • SHA256

    da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1

  • SHA512

    f2ac8ae77cef7703e17e113fe9e0f46082b1bb1916677df2aa9dd6f904e44bc90f477d12278a3764ad9872e30940fd0b11ac9f3db12f1db03321f3627f5179da

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVg/:P5eznsjsguGDFqGZ2rDLy

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1N

    • Size

      120KB

    • MD5

      cf28cd2e4d302f8084428ae2154a1090

    • SHA1

      438ea7a74a106f663955707affc9ba1ccdf10d18

    • SHA256

      da9d0b5a0fb229ebd54e20802c5d7d4d26281d74dce946eaaac7bec5c812cce1

    • SHA512

      f2ac8ae77cef7703e17e113fe9e0f46082b1bb1916677df2aa9dd6f904e44bc90f477d12278a3764ad9872e30940fd0b11ac9f3db12f1db03321f3627f5179da

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVg/:P5eznsjsguGDFqGZ2rDLy

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks