General

  • Target

    42cf8f73d3118797d370f8a4f0df809b_JaffaCakes118

  • Size

    31KB

  • Sample

    240713-wyny8ssajm

  • MD5

    42cf8f73d3118797d370f8a4f0df809b

  • SHA1

    c587620e3c88ed3175d5bfdc64ffaa83c6263c80

  • SHA256

    313c38f07a9bf91b834f3c9c060357b6c68f1acfcb168762716066c894e7c4c8

  • SHA512

    ec2c68b3a1f1834166668c25aa52eb93b0d197dfe322b6ef6f83c975386acb07082f2f4a9f9e56c892f47a730160947fa6c7e9e54a0f81ac3b0068c91270925d

  • SSDEEP

    768:CfmyQpp77WzxROtNKj/qx/vkiQmIDUu0tioDj:qEKGxXQVkLj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SQL Server VSS Wrider

C2

0.tcp.ngrok.io:13436

Mutex

1f128a35c00c4b30a2683d0434a99bc0

Attributes
  • reg_key

    1f128a35c00c4b30a2683d0434a99bc0

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      42cf8f73d3118797d370f8a4f0df809b_JaffaCakes118

    • Size

      31KB

    • MD5

      42cf8f73d3118797d370f8a4f0df809b

    • SHA1

      c587620e3c88ed3175d5bfdc64ffaa83c6263c80

    • SHA256

      313c38f07a9bf91b834f3c9c060357b6c68f1acfcb168762716066c894e7c4c8

    • SHA512

      ec2c68b3a1f1834166668c25aa52eb93b0d197dfe322b6ef6f83c975386acb07082f2f4a9f9e56c892f47a730160947fa6c7e9e54a0f81ac3b0068c91270925d

    • SSDEEP

      768:CfmyQpp77WzxROtNKj/qx/vkiQmIDUu0tioDj:qEKGxXQVkLj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks