General

  • Target

    440776946da09827ff0ac2f56741c086_JaffaCakes118

  • Size

    361KB

  • Sample

    240515-b5jb4sbf38

  • MD5

    440776946da09827ff0ac2f56741c086

  • SHA1

    62cfd5f03712e636fd5883f2b92fb565d2207f33

  • SHA256

    cebee7dc0112f960319868d6df1f9db37868e1912def20304af20a21bf409250

  • SHA512

    521288f212ffd3a3422ca36c8e6fca3ee94030ea5b369798e3332e4a52c4a3f94cdcd9b70e31a7ae1f85c93527161349827dacb285f11529e799932db4522b1d

  • SSDEEP

    6144:k2EKdoUIe33cHZBYuJalMd13x0cH9Bek4PN5mYUpg:HEKGf5UlY3zH9BsmYUi

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NYAN CAT

C2

dongreg202020.kozow.com:8874

Mutex

df42226e7936412c9a9e4b35efad0718

Attributes
  • reg_key

    df42226e7936412c9a9e4b35efad0718

  • splitter

    |'|'|

Targets

    • Target

      440776946da09827ff0ac2f56741c086_JaffaCakes118

    • Size

      361KB

    • MD5

      440776946da09827ff0ac2f56741c086

    • SHA1

      62cfd5f03712e636fd5883f2b92fb565d2207f33

    • SHA256

      cebee7dc0112f960319868d6df1f9db37868e1912def20304af20a21bf409250

    • SHA512

      521288f212ffd3a3422ca36c8e6fca3ee94030ea5b369798e3332e4a52c4a3f94cdcd9b70e31a7ae1f85c93527161349827dacb285f11529e799932db4522b1d

    • SSDEEP

      6144:k2EKdoUIe33cHZBYuJalMd13x0cH9Bek4PN5mYUpg:HEKGf5UlY3zH9BsmYUi

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks