General

  • Target

    809b1d7d62c6f7008b6ee36a4813cbcb_JaffaCakes118

  • Size

    23KB

  • Sample

    240529-nrrsjsdg96

  • MD5

    809b1d7d62c6f7008b6ee36a4813cbcb

  • SHA1

    23e3f4f15e55e147f584accd32263bfafed042f7

  • SHA256

    bb92b3e624e7ab6f198ab61efe26490e2572b25de60ecfd8c400633d09877956

  • SHA512

    6f22907cc7b36dda2e26b3b4331fafa1b1065445e6b21d4fdbda4388199c59d118ba0fe205dd73a2e973d9d1619663a93f1e1e2559e46d5777df6659e99f9e73

  • SSDEEP

    384:JXwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZN8:J8TbC81NgRpcnup

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

W3D

C2

178.33.34.238:80

Mutex

09ee54365a3476474a4dd7eb84bad89f

Attributes
  • reg_key

    09ee54365a3476474a4dd7eb84bad89f

  • splitter

    |'|'|

Targets

    • Target

      809b1d7d62c6f7008b6ee36a4813cbcb_JaffaCakes118

    • Size

      23KB

    • MD5

      809b1d7d62c6f7008b6ee36a4813cbcb

    • SHA1

      23e3f4f15e55e147f584accd32263bfafed042f7

    • SHA256

      bb92b3e624e7ab6f198ab61efe26490e2572b25de60ecfd8c400633d09877956

    • SHA512

      6f22907cc7b36dda2e26b3b4331fafa1b1065445e6b21d4fdbda4388199c59d118ba0fe205dd73a2e973d9d1619663a93f1e1e2559e46d5777df6659e99f9e73

    • SSDEEP

      384:JXwz6+T4IjWZFNwXU0eiNUBdvt6lgT+lLOhXxQmRvR6JZlbw8hqIusZzZN8:J8TbC81NgRpcnup

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks