General

  • Target

    1453dea35bb0999da71915c5f67aa02f_JaffaCakes118

  • Size

    31KB

  • Sample

    240504-y4kj4sdb93

  • MD5

    1453dea35bb0999da71915c5f67aa02f

  • SHA1

    bea0bc17d93324afe2de3125e749d32cfc93d62e

  • SHA256

    34fce5dfe31c71df306d1928ee1b230c1fcd6e405372b86c805d55decae90cf6

  • SHA512

    45fbf4def048becdf047d13f079f618b804a37bc6183f49c6a147254e43ec70caf699cd5ab686d23c5f1fd213c2eb950b8ceb3f4110f9465a092ea4aade53b87

  • SSDEEP

    768:/5bSzG1XB9Qzxry13IPf4bxvy/QmIDUu0tiusj:km6ixoQVkaj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

AimWhTrigger

C2

192.168.1.106:1234

Mutex

8800635067c4e3ff3eb68b999162adf3

Attributes
  • reg_key

    8800635067c4e3ff3eb68b999162adf3

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      1453dea35bb0999da71915c5f67aa02f_JaffaCakes118

    • Size

      31KB

    • MD5

      1453dea35bb0999da71915c5f67aa02f

    • SHA1

      bea0bc17d93324afe2de3125e749d32cfc93d62e

    • SHA256

      34fce5dfe31c71df306d1928ee1b230c1fcd6e405372b86c805d55decae90cf6

    • SHA512

      45fbf4def048becdf047d13f079f618b804a37bc6183f49c6a147254e43ec70caf699cd5ab686d23c5f1fd213c2eb950b8ceb3f4110f9465a092ea4aade53b87

    • SSDEEP

      768:/5bSzG1XB9Qzxry13IPf4bxvy/QmIDUu0tiusj:km6ixoQVkaj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks