General

  • Target

    068b30a7fe9e7667255a245530df417d.exe

  • Size

    115KB

  • Sample

    250119-ccn8bssmcl

  • MD5

    068b30a7fe9e7667255a245530df417d

  • SHA1

    4bb22f2b6565b693c3cce69d91c68735c2a24059

  • SHA256

    c3d9caaeaf98c26409460994ae65613e3fbad63418c1a4c52a66be504acd3324

  • SHA512

    cb177ad2748c5ba9119635af40330bb1496c2a5c46dea744947065095e2a6c5b71ebaf38173673503ec2078e192c7e88375575d2cf92bafc2191c87a43798b8a

  • SSDEEP

    1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmMi:w5eznsjsguGDFqGx8egoxmO3rRmP

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      068b30a7fe9e7667255a245530df417d.exe

    • Size

      115KB

    • MD5

      068b30a7fe9e7667255a245530df417d

    • SHA1

      4bb22f2b6565b693c3cce69d91c68735c2a24059

    • SHA256

      c3d9caaeaf98c26409460994ae65613e3fbad63418c1a4c52a66be504acd3324

    • SHA512

      cb177ad2748c5ba9119635af40330bb1496c2a5c46dea744947065095e2a6c5b71ebaf38173673503ec2078e192c7e88375575d2cf92bafc2191c87a43798b8a

    • SSDEEP

      1536:orp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4xtKegoxmOBh73RmMi:w5eznsjsguGDFqGx8egoxmO3rRmP

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks