General

  • Target

    62109846d41e8973d7366980a78857ffJaffaCakes118

  • Size

    23KB

  • Sample

    240523-arx3nseh35

  • MD5

    62109846d41e8973d7366980a78857ff

  • SHA1

    156a03f22e52ca8d64bb7e6b1571932f94413d0f

  • SHA256

    152b1470af902d9e3e1177432a946bf0fde47ff08899b10b815d73257ec30f4c

  • SHA512

    956ea1294e8c515037630790ae484ea7e0c2c5450369a236e2e231be11fd3d359aba30bb0c2751f5761af7000ec0b011e98c21470527d5a1cef632606ae32778

  • SSDEEP

    384:K9sqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZyx:Kmf65K2Yf1jKRpcnuh

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

27.115.99.126:44443

Mutex

d7089cddb5c8421b544fd111f9cdc4e9

Attributes
  • reg_key

    d7089cddb5c8421b544fd111f9cdc4e9

  • splitter

    |'|'|

Targets

    • Target

      62109846d41e8973d7366980a78857ffJaffaCakes118

    • Size

      23KB

    • MD5

      62109846d41e8973d7366980a78857ff

    • SHA1

      156a03f22e52ca8d64bb7e6b1571932f94413d0f

    • SHA256

      152b1470af902d9e3e1177432a946bf0fde47ff08899b10b815d73257ec30f4c

    • SHA512

      956ea1294e8c515037630790ae484ea7e0c2c5450369a236e2e231be11fd3d359aba30bb0c2751f5761af7000ec0b011e98c21470527d5a1cef632606ae32778

    • SSDEEP

      384:K9sqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZyx:Kmf65K2Yf1jKRpcnuh

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks