General

  • Target

    7a3c485d49f5f7adadcc37283d7b0ac83dfaef636474226b9270ec5459560bc0.exe

  • Size

    120KB

  • Sample

    250201-wrlwastpgt

  • MD5

    603c3bb9aa374f8715ecafbabfaa1f2e

  • SHA1

    9666c9a99f45865a1c2feaf57d49998f7ae930c0

  • SHA256

    7a3c485d49f5f7adadcc37283d7b0ac83dfaef636474226b9270ec5459560bc0

  • SHA512

    4fef7dbae3d023b7aa1486cf8df5935f9686d72cd646a46935a292573e3d45af70b1783efc660e6976ab721daa0c8c6022c0ac130b09031e78bf37a7351b4a7c

  • SSDEEP

    1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVgl:P5eznsjsguGDFqGZ2rDL8

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      7a3c485d49f5f7adadcc37283d7b0ac83dfaef636474226b9270ec5459560bc0.exe

    • Size

      120KB

    • MD5

      603c3bb9aa374f8715ecafbabfaa1f2e

    • SHA1

      9666c9a99f45865a1c2feaf57d49998f7ae930c0

    • SHA256

      7a3c485d49f5f7adadcc37283d7b0ac83dfaef636474226b9270ec5459560bc0

    • SHA512

      4fef7dbae3d023b7aa1486cf8df5935f9686d72cd646a46935a292573e3d45af70b1783efc660e6976ab721daa0c8c6022c0ac130b09031e78bf37a7351b4a7c

    • SSDEEP

      1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDLVgl:P5eznsjsguGDFqGZ2rDL8

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks