General

  • Target

    d30b2635874071bc14077678bec52a3c_JaffaCakes118

  • Size

    46KB

  • Sample

    240907-3b848atcmc

  • MD5

    d30b2635874071bc14077678bec52a3c

  • SHA1

    f0f87b36eee34aab8e4df6bb26f4cddb2aaadbd7

  • SHA256

    522368c63afd804c949889c0316b113d4019d720b76fec1d773a94b7eee1f94e

  • SHA512

    96ac23320acf15b7cfca1b41a954539098faa37b3fc627e5f6536518a9913b4723cc0c53b9c2b0fd3602890e8d06d332952ed7b0ab529520bb2b13862995f1eb

  • SSDEEP

    768:rMpD+Zwq3r1uFbaYh+Jnq7az+xRug+n2hpUE+fDNkQp6HwfYTpP3KoDHQPc+e4Z:rmD+HZuY5q7az+GgDbUfZkQTfApP3KoY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

B HAT

Mutex

1fcb8fb3a4794ae29f1b8ef01d138a35

Attributes
  • reg_key

    1fcb8fb3a4794ae29f1b8ef01d138a35

  • splitter

    |'|'|

Targets

    • Target

      d30b2635874071bc14077678bec52a3c_JaffaCakes118

    • Size

      46KB

    • MD5

      d30b2635874071bc14077678bec52a3c

    • SHA1

      f0f87b36eee34aab8e4df6bb26f4cddb2aaadbd7

    • SHA256

      522368c63afd804c949889c0316b113d4019d720b76fec1d773a94b7eee1f94e

    • SHA512

      96ac23320acf15b7cfca1b41a954539098faa37b3fc627e5f6536518a9913b4723cc0c53b9c2b0fd3602890e8d06d332952ed7b0ab529520bb2b13862995f1eb

    • SSDEEP

      768:rMpD+Zwq3r1uFbaYh+Jnq7az+xRug+n2hpUE+fDNkQp6HwfYTpP3KoDHQPc+e4Z:rmD+HZuY5q7az+GgDbUfZkQTfApP3KoY

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks