General

  • Target

    ce7c682b41dc24a7aee277ef486db55d_JaffaCakes118

  • Size

    23KB

  • Sample

    240906-de9gqasdmn

  • MD5

    ce7c682b41dc24a7aee277ef486db55d

  • SHA1

    76a4a36a116b3f440a3a4b75ddc269e120d0862b

  • SHA256

    6a5fa2a0d30e512ed9f64e432d8be5c703b607d4d3414d1583ec2bc6d7c24a8c

  • SHA512

    f68e2420159e24b3038334b62bb30ff5db689be9ca67f89685febba85c4ad40ab1a0aefdbfaf57151a49cffccd572b298cb88d2538036f234da5cc64efab6129

  • SSDEEP

    384:WQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZhD:B5yBVd7RpcnuO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

fetrigultu.zapto.org:5252

Mutex

cfd91aab224afdb4fadd3519f5ec56eb

Attributes
  • reg_key

    cfd91aab224afdb4fadd3519f5ec56eb

  • splitter

    |'|'|

Targets

    • Target

      ce7c682b41dc24a7aee277ef486db55d_JaffaCakes118

    • Size

      23KB

    • MD5

      ce7c682b41dc24a7aee277ef486db55d

    • SHA1

      76a4a36a116b3f440a3a4b75ddc269e120d0862b

    • SHA256

      6a5fa2a0d30e512ed9f64e432d8be5c703b607d4d3414d1583ec2bc6d7c24a8c

    • SHA512

      f68e2420159e24b3038334b62bb30ff5db689be9ca67f89685febba85c4ad40ab1a0aefdbfaf57151a49cffccd572b298cb88d2538036f234da5cc64efab6129

    • SSDEEP

      384:WQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZhD:B5yBVd7RpcnuO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks