General

  • Target

    e2f3fb9ca8aafb5a580d3676c59f68ce40f0e472d4efcc37a10c5374642b3ec7

  • Size

    115KB

  • Sample

    250116-kysfwasng1

  • MD5

    3b3fb0d2b49701581db19be40624f489

  • SHA1

    6251b652e29230378d9d5a2cc25d8e1747f348c9

  • SHA256

    e2f3fb9ca8aafb5a580d3676c59f68ce40f0e472d4efcc37a10c5374642b3ec7

  • SHA512

    1dd5ed2974d857974941fca8b2894318f915edd7fbd0f8d049f924755d28cd5f39fe7d941d4e174e0e02bad9a2374765868b42b6cf83be58a5fc9dcf4e8cf778

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmPH:w5eznsjsguGDFqGx8egoxmO3rRmf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      e2f3fb9ca8aafb5a580d3676c59f68ce40f0e472d4efcc37a10c5374642b3ec7

    • Size

      115KB

    • MD5

      3b3fb0d2b49701581db19be40624f489

    • SHA1

      6251b652e29230378d9d5a2cc25d8e1747f348c9

    • SHA256

      e2f3fb9ca8aafb5a580d3676c59f68ce40f0e472d4efcc37a10c5374642b3ec7

    • SHA512

      1dd5ed2974d857974941fca8b2894318f915edd7fbd0f8d049f924755d28cd5f39fe7d941d4e174e0e02bad9a2374765868b42b6cf83be58a5fc9dcf4e8cf778

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmPH:w5eznsjsguGDFqGx8egoxmO3rRmf

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks