General

  • Target

    33e8450160a2b031204b78ead0a686b1_JaffaCakes118

  • Size

    732KB

  • Sample

    240511-lgrcxsdh22

  • MD5

    33e8450160a2b031204b78ead0a686b1

  • SHA1

    cca3b6eb223298d08f3f460d2140240d6d9fe2ee

  • SHA256

    e0efc0bcac7885ee20f46fcfc03bab69ffe22aef8e433ac26238773ee12ed347

  • SHA512

    4583895870e0fd75ea8ba4bb8599500c5730101d969ce1923e8279cd3a931a4b9d44cf1b678243e9cbce24c6502c7107442ed90204d891b669e05f919986e88d

  • SSDEEP

    12288:Vc9YEusLiBNucUuO4S1afjD60d9N4dzn+9WQasEk7PPcRUGl76kdATS0181frlS:Vc9YEusLiHucUMS1afjD60d9N4tn+9WP

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

image

C2

hostingerrrrrr.ddns.net:3333

Mutex

8544f46789c845732e4b256e024189da

Attributes
  • reg_key

    8544f46789c845732e4b256e024189da

  • splitter

    |'|'|

Targets

    • Target

      33e8450160a2b031204b78ead0a686b1_JaffaCakes118

    • Size

      732KB

    • MD5

      33e8450160a2b031204b78ead0a686b1

    • SHA1

      cca3b6eb223298d08f3f460d2140240d6d9fe2ee

    • SHA256

      e0efc0bcac7885ee20f46fcfc03bab69ffe22aef8e433ac26238773ee12ed347

    • SHA512

      4583895870e0fd75ea8ba4bb8599500c5730101d969ce1923e8279cd3a931a4b9d44cf1b678243e9cbce24c6502c7107442ed90204d891b669e05f919986e88d

    • SSDEEP

      12288:Vc9YEusLiBNucUuO4S1afjD60d9N4dzn+9WQasEk7PPcRUGl76kdATS0181frlS:Vc9YEusLiHucUMS1afjD60d9N4tn+9WP

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks