General

  • Target

    6d2b7843f0e9168704d4c71108cfdc50_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240524-dvq1babb9y

  • MD5

    6d2b7843f0e9168704d4c71108cfdc50

  • SHA1

    3fb8ed1bc9eb790af15c1f18486ac5461a44ed71

  • SHA256

    f2efdb91127d45b051573b56d5390401a0067eb015f2db95a65563dea235555e

  • SHA512

    56622c990c77363bf709cba7684dd484fe96b24aa2f8f68828b494d556bb73d800955fc080a9d6e24d5f4c7f3c39a11d49d2870e1f0869a6912ef36fa67df0b0

  • SSDEEP

    24576:NzPMEK/3JXKFN53ZVwK3FOn+rPcgVATn9LH4GkYsBHwEo:BPfWQjfY+bcgVmJQYsBHwR

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

coder

C2

81.61.77.92:5553

Mutex

890f73d3282170b26075ca7917951b6e

Attributes
  • reg_key

    890f73d3282170b26075ca7917951b6e

  • splitter

    |'|'|

Targets

    • Target

      6d2b7843f0e9168704d4c71108cfdc50_JaffaCakes118

    • Size

      1.1MB

    • MD5

      6d2b7843f0e9168704d4c71108cfdc50

    • SHA1

      3fb8ed1bc9eb790af15c1f18486ac5461a44ed71

    • SHA256

      f2efdb91127d45b051573b56d5390401a0067eb015f2db95a65563dea235555e

    • SHA512

      56622c990c77363bf709cba7684dd484fe96b24aa2f8f68828b494d556bb73d800955fc080a9d6e24d5f4c7f3c39a11d49d2870e1f0869a6912ef36fa67df0b0

    • SSDEEP

      24576:NzPMEK/3JXKFN53ZVwK3FOn+rPcgVATn9LH4GkYsBHwEo:BPfWQjfY+bcgVmJQYsBHwR

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks