General

  • Target

    75af76d2a53d30d3d005ed79719b0839_JaffaCakes118

  • Size

    23KB

  • Sample

    240526-q5zresgf8x

  • MD5

    75af76d2a53d30d3d005ed79719b0839

  • SHA1

    e811f724203ec37b0ac9906349db186a190540ba

  • SHA256

    e58d01ecd88c6acb84893e0a4ecbc823cc3715770d22e1e761f9c5ec9b44d5b1

  • SHA512

    d512cbbe97f7a1bb6bd7744192e7b845d89544ef008cd241d22b4f69ebc9be8796388efe49a96d7d203fc994f8af8ece63f2664560a357f943db74e611c177a7

  • SSDEEP

    384:yluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZLm:lOmhtIiRpcnuh

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

tplinklocal.linkpc.net:1177

Mutex

ac439180f0d27caad533e0a9c298c9a2

Attributes
  • reg_key

    ac439180f0d27caad533e0a9c298c9a2

  • splitter

    |'|'|

Targets

    • Target

      75af76d2a53d30d3d005ed79719b0839_JaffaCakes118

    • Size

      23KB

    • MD5

      75af76d2a53d30d3d005ed79719b0839

    • SHA1

      e811f724203ec37b0ac9906349db186a190540ba

    • SHA256

      e58d01ecd88c6acb84893e0a4ecbc823cc3715770d22e1e761f9c5ec9b44d5b1

    • SHA512

      d512cbbe97f7a1bb6bd7744192e7b845d89544ef008cd241d22b4f69ebc9be8796388efe49a96d7d203fc994f8af8ece63f2664560a357f943db74e611c177a7

    • SSDEEP

      384:yluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZLm:lOmhtIiRpcnuh

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks