General

  • Target

    d1568f14823089ebe25ffe06fed9a817_JaffaCakes118

  • Size

    23KB

  • Sample

    240907-hrev4a1blj

  • MD5

    d1568f14823089ebe25ffe06fed9a817

  • SHA1

    d5b7c7174a5051a89d10f7f84ef35d796a1b44b8

  • SHA256

    c67878e00a99a72a6f8cc2e66e2fa937fe8158b353c69b9e1e6db7dd113517dc

  • SHA512

    57562c798ae6a87baebece29a220f7fbc25b81d5b637fb8ff7715998aaf7761d68030dbed0192c42b180f6c0894d79565346cff4387f8af8df06de6078abd264

  • SSDEEP

    384:2Cc68yCaUVIhboNgfEimfkNzayS06vg5UhcpxH7ndmRvR6JZlbw8hqIusZzZfq:n873kgNfoaf6ARpcnu1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

5b3e54e9cc617e65ba54f23d81df86b3

Attributes
  • reg_key

    5b3e54e9cc617e65ba54f23d81df86b3

  • splitter

    |'|'|

Targets

    • Target

      d1568f14823089ebe25ffe06fed9a817_JaffaCakes118

    • Size

      23KB

    • MD5

      d1568f14823089ebe25ffe06fed9a817

    • SHA1

      d5b7c7174a5051a89d10f7f84ef35d796a1b44b8

    • SHA256

      c67878e00a99a72a6f8cc2e66e2fa937fe8158b353c69b9e1e6db7dd113517dc

    • SHA512

      57562c798ae6a87baebece29a220f7fbc25b81d5b637fb8ff7715998aaf7761d68030dbed0192c42b180f6c0894d79565346cff4387f8af8df06de6078abd264

    • SSDEEP

      384:2Cc68yCaUVIhboNgfEimfkNzayS06vg5UhcpxH7ndmRvR6JZlbw8hqIusZzZfq:n873kgNfoaf6ARpcnu1

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks