General

  • Target

    0647bc3f3afa64f6199612dd74c6a6dc_JaffaCakes118

  • Size

    37KB

  • Sample

    240428-26ptdsbe52

  • MD5

    0647bc3f3afa64f6199612dd74c6a6dc

  • SHA1

    565b5235965fb58072b7cd4c6fdf04f93d164907

  • SHA256

    d92af23a5c3e9f09e1ba0ee47cfbbc859d76cc6c2be6bc5503342ee40bb067e9

  • SHA512

    9588a76db413f847b30b73f625c1031291692fed3284fdddf6ea88488bce9abebaee305394a84e4a9caff591bb2ba5cb2d7468b6a7e1f1f6eb9e8d7b4a8c2392

  • SSDEEP

    384:wQzhyEit3PJWtckUy8fveHtOe9vmkHKrAF+rMRTyN/0L+EcoinblneHQM3epzXXq:DMzkX8fveUIm4KrM+rMRa8Nu5Ot

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

audio

C2

sakurahost.ddns.net:2221

Mutex

c27652c2f32dba5bf896fc84fa2b7cb5

Attributes
  • reg_key

    c27652c2f32dba5bf896fc84fa2b7cb5

  • splitter

    |'|'|

Targets

    • Target

      0647bc3f3afa64f6199612dd74c6a6dc_JaffaCakes118

    • Size

      37KB

    • MD5

      0647bc3f3afa64f6199612dd74c6a6dc

    • SHA1

      565b5235965fb58072b7cd4c6fdf04f93d164907

    • SHA256

      d92af23a5c3e9f09e1ba0ee47cfbbc859d76cc6c2be6bc5503342ee40bb067e9

    • SHA512

      9588a76db413f847b30b73f625c1031291692fed3284fdddf6ea88488bce9abebaee305394a84e4a9caff591bb2ba5cb2d7468b6a7e1f1f6eb9e8d7b4a8c2392

    • SSDEEP

      384:wQzhyEit3PJWtckUy8fveHtOe9vmkHKrAF+rMRTyN/0L+EcoinblneHQM3epzXXq:DMzkX8fveUIm4KrM+rMRa8Nu5Ot

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks