General

  • Target

    c58a7e41b0350e35fe0a627f84a2fb94_JaffaCakes118

  • Size

    23KB

  • Sample

    240827-xmyjzaweja

  • MD5

    c58a7e41b0350e35fe0a627f84a2fb94

  • SHA1

    ea4ae327ed6d693570f5d3916952bd00c4ab26b5

  • SHA256

    216b97d7dd4beaa884eec7b6d8384e9a12ba02d960aa6f340889fa84f1b59ea9

  • SHA512

    f019a271155c94595af7c06afffb082a0ea7fa2034f6e5bbd7de7b1461253f42c124472980324a6359402468bf1b83a81cb8a37e23e00d17968343b754341145

  • SSDEEP

    384:VV8aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZbjwHM:VdY+sNKqNHnSdRpcnuuYM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

kimtot

C2

server-my.ddns.net:1460

Mutex

2d4c5a4b396108380f3f71341d62d660

Attributes
  • reg_key

    2d4c5a4b396108380f3f71341d62d660

  • splitter

    |'|'|

Targets

    • Target

      c58a7e41b0350e35fe0a627f84a2fb94_JaffaCakes118

    • Size

      23KB

    • MD5

      c58a7e41b0350e35fe0a627f84a2fb94

    • SHA1

      ea4ae327ed6d693570f5d3916952bd00c4ab26b5

    • SHA256

      216b97d7dd4beaa884eec7b6d8384e9a12ba02d960aa6f340889fa84f1b59ea9

    • SHA512

      f019a271155c94595af7c06afffb082a0ea7fa2034f6e5bbd7de7b1461253f42c124472980324a6359402468bf1b83a81cb8a37e23e00d17968343b754341145

    • SSDEEP

      384:VV8aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZbjwHM:VdY+sNKqNHnSdRpcnuuYM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks