General

  • Target

    c831430273ea213ea954d43aa44ff747_JaffaCakes118

  • Size

    32KB

  • Sample

    240829-ejkvlavanq

  • MD5

    c831430273ea213ea954d43aa44ff747

  • SHA1

    b2c2ecf729c6716c3ae8475c22174b8f9cf3d54b

  • SHA256

    00da099a0da5a5696c213e24c0360d0ac951840fbc75e1dc1d7194482aa0484e

  • SHA512

    139717fc3d4d39fc85ef3a5ddbd8f97b2305074f3ad89735effce1c28f6aab939b8a547f87a2d2a9fef8587d44f29f1c75eb29b38f64e0087b95b1be9e78ddd0

  • SSDEEP

    384:u/lvokLAB6R4qxsit7ZUtNAHfhFPIyuTwo5lDQodg9TdFpyFEIGsJjwE7UMcrieu:CD+Jg7ZU07euouDbEEIGfRS+f

Malware Config

Extracted

Family

njrat

Botnet

Hacked By HiDDen PerSOn

Mutex

90ef69ecf72d716872dc5bdd422fb586

Attributes
  • reg_key

    90ef69ecf72d716872dc5bdd422fb586

Targets

    • Target

      c831430273ea213ea954d43aa44ff747_JaffaCakes118

    • Size

      32KB

    • MD5

      c831430273ea213ea954d43aa44ff747

    • SHA1

      b2c2ecf729c6716c3ae8475c22174b8f9cf3d54b

    • SHA256

      00da099a0da5a5696c213e24c0360d0ac951840fbc75e1dc1d7194482aa0484e

    • SHA512

      139717fc3d4d39fc85ef3a5ddbd8f97b2305074f3ad89735effce1c28f6aab939b8a547f87a2d2a9fef8587d44f29f1c75eb29b38f64e0087b95b1be9e78ddd0

    • SSDEEP

      384:u/lvokLAB6R4qxsit7ZUtNAHfhFPIyuTwo5lDQodg9TdFpyFEIGsJjwE7UMcrieu:CD+Jg7ZU07euouDbEEIGfRS+f

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks