General

  • Target

    72eeb527e52a5cc41653fd6ac54d81c5_JaffaCakes118

  • Size

    23.3MB

  • Sample

    240726-g8x8bsveje

  • MD5

    72eeb527e52a5cc41653fd6ac54d81c5

  • SHA1

    7974859e639991bd4f1971def671d9cdd0a39fcd

  • SHA256

    023d2f6830934a1715e45bbeaf3a6a15454de2f9e83a7633378e6a39fab0f75b

  • SHA512

    70b124e24c5ed3cd6d954a53d5afe41e7d7c4bb6439bdd3e522122c23ce06d62efe22d84ef95941c06db3a69d0d221400402d5d45fcdf16d79850ac3343e4720

  • SSDEEP

    393216:o2sGm4gsaeVQrU2r2sujMK2u1fFAiTELux/NwrLB8nJ37WGqS1XdHqU7yv6snJSz:jmfyQrU2rGjmGXAqtN9nBqS1Xd776JSG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

spiner847.servehalflife.com:8393

Mutex

3cb13f4913f68ffd4bfbc241b440e190

Attributes
  • reg_key

    3cb13f4913f68ffd4bfbc241b440e190

  • splitter

    |'|'|

Targets

    • Target

      72eeb527e52a5cc41653fd6ac54d81c5_JaffaCakes118

    • Size

      23.3MB

    • MD5

      72eeb527e52a5cc41653fd6ac54d81c5

    • SHA1

      7974859e639991bd4f1971def671d9cdd0a39fcd

    • SHA256

      023d2f6830934a1715e45bbeaf3a6a15454de2f9e83a7633378e6a39fab0f75b

    • SHA512

      70b124e24c5ed3cd6d954a53d5afe41e7d7c4bb6439bdd3e522122c23ce06d62efe22d84ef95941c06db3a69d0d221400402d5d45fcdf16d79850ac3343e4720

    • SSDEEP

      393216:o2sGm4gsaeVQrU2r2sujMK2u1fFAiTELux/NwrLB8nJ37WGqS1XdHqU7yv6snJSz:jmfyQrU2rGjmGXAqtN9nBqS1Xd776JSG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks