General

  • Target

    d211887dcc729a782b236236c69ccd81_JaffaCakes118

  • Size

    153KB

  • Sample

    240907-q2am5axbjp

  • MD5

    d211887dcc729a782b236236c69ccd81

  • SHA1

    b6726f66a09b60e18f621423bb04c7cce0590968

  • SHA256

    2d9a00c61807ea0eb013feda7d2f7d95e5248bbf8e433c83a18e4ecec0a3e1f1

  • SHA512

    fac76c52a18d89594e278d58cf5529d95f62e2c8150d0bcbac45f67aa48a939524803e75a12c92ed245e0563da575504836b07ca4e2e1976a9cf4dc49a0079bb

  • SSDEEP

    3072:IEhO2XTwJUAf3b1NRI4Qo8sw3W9WXiaQ6LhE2hcii8B+XLm2j:N82k/I68UjavXfi8BU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

vanto1o1m000.hopto.org:5552

Mutex

a9cf687f880c397b4c0251aa6523248c

Attributes
  • reg_key

    a9cf687f880c397b4c0251aa6523248c

  • splitter

    |'|'|

Targets

    • Target

      d211887dcc729a782b236236c69ccd81_JaffaCakes118

    • Size

      153KB

    • MD5

      d211887dcc729a782b236236c69ccd81

    • SHA1

      b6726f66a09b60e18f621423bb04c7cce0590968

    • SHA256

      2d9a00c61807ea0eb013feda7d2f7d95e5248bbf8e433c83a18e4ecec0a3e1f1

    • SHA512

      fac76c52a18d89594e278d58cf5529d95f62e2c8150d0bcbac45f67aa48a939524803e75a12c92ed245e0563da575504836b07ca4e2e1976a9cf4dc49a0079bb

    • SSDEEP

      3072:IEhO2XTwJUAf3b1NRI4Qo8sw3W9WXiaQ6LhE2hcii8B+XLm2j:N82k/I68UjavXfi8BU

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks