General

  • Target

    7cdeacbb18a2c81582a05eef50d4d3fd_JaffaCakes118

  • Size

    89KB

  • Sample

    240528-n6weaabd3t

  • MD5

    7cdeacbb18a2c81582a05eef50d4d3fd

  • SHA1

    6b7fd36f7189c6caa8de8c9275fadd90dfd525b1

  • SHA256

    aeb145bf215452b59f13c7f5e26951238a374974c97cae074e009ab8ecf2c6ac

  • SHA512

    42ddcd3fd0dab7cc3ff0a8b106f426959533b2063db194f5e3f1ba6466b94e0d8dc5b5a5d0ca7d1d10790a76c7c1bb21f8dbf8a34cf43e154e620109c4ee79ee

  • SSDEEP

    384:/NQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZjPuRQfNQ19AT:/i5yBVd7RpcnuEuRQfNQ19dFNYcDS

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Vitima

C2

m4k0y.duckdns.org:1009

Mutex

c397e8d4919f87cbbc87852792f41d36

Attributes
  • reg_key

    c397e8d4919f87cbbc87852792f41d36

  • splitter

    |'|'|

Targets

    • Target

      7cdeacbb18a2c81582a05eef50d4d3fd_JaffaCakes118

    • Size

      89KB

    • MD5

      7cdeacbb18a2c81582a05eef50d4d3fd

    • SHA1

      6b7fd36f7189c6caa8de8c9275fadd90dfd525b1

    • SHA256

      aeb145bf215452b59f13c7f5e26951238a374974c97cae074e009ab8ecf2c6ac

    • SHA512

      42ddcd3fd0dab7cc3ff0a8b106f426959533b2063db194f5e3f1ba6466b94e0d8dc5b5a5d0ca7d1d10790a76c7c1bb21f8dbf8a34cf43e154e620109c4ee79ee

    • SSDEEP

      384:/NQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZjPuRQfNQ19AT:/i5yBVd7RpcnuEuRQfNQ19dFNYcDS

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks