General

  • Target

    c729fc50e20cad4217a371e495c1ad13_JaffaCakes118

  • Size

    282KB

  • Sample

    240828-ta2jbawgqj

  • MD5

    c729fc50e20cad4217a371e495c1ad13

  • SHA1

    81061d277a115841d77b76096967c25c30eb29b9

  • SHA256

    81a572f1f7feb419b70e9fbe890348dcb3bdda3cb1adad2265ffd527b643b794

  • SHA512

    feb82cc70145fccdbf008d5e862e6f1a07a850bdac417cb64f44bfda4b70e8172dca184bf0491e4f55e92eb7d1c3438456b1e779eabcfece9ca4083d85d89afc

  • SSDEEP

    6144:bvnbmeupUYeDsubYWZnI75wITdyOzUcnoU:zi1pHubYWBISydyOz5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Memu new

C2

lganashadow.servemp3.com:653

Mutex

Intrnetdownloadmanger

Attributes
  • reg_key

    Intrnetdownloadmanger

  • splitter

    Sky

Targets

    • Target

      c729fc50e20cad4217a371e495c1ad13_JaffaCakes118

    • Size

      282KB

    • MD5

      c729fc50e20cad4217a371e495c1ad13

    • SHA1

      81061d277a115841d77b76096967c25c30eb29b9

    • SHA256

      81a572f1f7feb419b70e9fbe890348dcb3bdda3cb1adad2265ffd527b643b794

    • SHA512

      feb82cc70145fccdbf008d5e862e6f1a07a850bdac417cb64f44bfda4b70e8172dca184bf0491e4f55e92eb7d1c3438456b1e779eabcfece9ca4083d85d89afc

    • SSDEEP

      6144:bvnbmeupUYeDsubYWZnI75wITdyOzUcnoU:zi1pHubYWBISydyOz5

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks