Resubmissions

27/08/2024, 23:23

240827-3dadnswgmd 10

27/08/2024, 15:37

240827-s2rmraxgrg 10

General

  • Target

    c5489c46ff110a09d63cb880955cd543_JaffaCakes118

  • Size

    31KB

  • Sample

    240827-3dadnswgmd

  • MD5

    c5489c46ff110a09d63cb880955cd543

  • SHA1

    757ce8d736c5c8d173844bb29431da3aa1056c9f

  • SHA256

    c48a3a204cc4f55790f858030b7cd8c1764b104650526bd679daf4fccfa7b4d2

  • SHA512

    e4d670d50fa40655b16cb360662152327d343c869f7cbf1e2764b3364b23fc65efb45b066b5c710de5eb3d7ee87de239a42cbd2d27672ff1d2bbc3ec98a2651f

  • SSDEEP

    768:tBfFlStrFZczxX6aq4jG3VFf1vqDQmIDUu0tiWwj:zyqZoFpcQVkej

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

username

C2

helpmepls123.ddns.net:6522

Mutex

997fb9a584520c7d72161d82bec2816f

Attributes
  • reg_key

    997fb9a584520c7d72161d82bec2816f

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      c5489c46ff110a09d63cb880955cd543_JaffaCakes118

    • Size

      31KB

    • MD5

      c5489c46ff110a09d63cb880955cd543

    • SHA1

      757ce8d736c5c8d173844bb29431da3aa1056c9f

    • SHA256

      c48a3a204cc4f55790f858030b7cd8c1764b104650526bd679daf4fccfa7b4d2

    • SHA512

      e4d670d50fa40655b16cb360662152327d343c869f7cbf1e2764b3364b23fc65efb45b066b5c710de5eb3d7ee87de239a42cbd2d27672ff1d2bbc3ec98a2651f

    • SSDEEP

      768:tBfFlStrFZczxX6aq4jG3VFf1vqDQmIDUu0tiWwj:zyqZoFpcQVkej

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks