General

  • Target

    fc239b6abe0a4c07a251e9141812c508_JaffaCakes118

  • Size

    247KB

  • Sample

    240420-g9g8haaf67

  • MD5

    fc239b6abe0a4c07a251e9141812c508

  • SHA1

    26334e4e1937a9676e8157a6ce0961368608c523

  • SHA256

    de234e51dcdb13d84e36faa5462b9934677015099413a06fb54f0ba4bf8a808b

  • SHA512

    2a8ed74e34aaa9651fc997b95ba6d5f11f6236eb74cd462187d81a877706f1fcfc50b8cfdb81a0536cc037ff6835d063c02f7a6fa0e189a0740d6d65e3f03ce8

  • SSDEEP

    6144:H1R0sPgL8mJD1fez2gdp1THFHkCz1GBT:H1R0sPgL8AD1eigd7zFHkCz1Gl

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

$$$$$$$$$$$

C2

1999411.no-ip.org:1000

Mutex

2f0e2ecefb2c62b645bf3055d820f2cf

Attributes
  • reg_key

    2f0e2ecefb2c62b645bf3055d820f2cf

  • splitter

    |'|'|

Targets

    • Target

      fc239b6abe0a4c07a251e9141812c508_JaffaCakes118

    • Size

      247KB

    • MD5

      fc239b6abe0a4c07a251e9141812c508

    • SHA1

      26334e4e1937a9676e8157a6ce0961368608c523

    • SHA256

      de234e51dcdb13d84e36faa5462b9934677015099413a06fb54f0ba4bf8a808b

    • SHA512

      2a8ed74e34aaa9651fc997b95ba6d5f11f6236eb74cd462187d81a877706f1fcfc50b8cfdb81a0536cc037ff6835d063c02f7a6fa0e189a0740d6d65e3f03ce8

    • SSDEEP

      6144:H1R0sPgL8mJD1fez2gdp1THFHkCz1GBT:H1R0sPgL8AD1eigd7zFHkCz1Gl

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Matrix ATT&CK v13

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks