General

  • Target

    d9148d1fe12ddae97026b8b47d6b5788_JaffaCakes118

  • Size

    23KB

  • Sample

    240910-1jngdawglr

  • MD5

    d9148d1fe12ddae97026b8b47d6b5788

  • SHA1

    4c796f8d10628a12ac7947ab04754fbc16e613d6

  • SHA256

    880ab8d8c5c0c1f1de079c6e74400c41106beda935bd7eaad9addecd868e6000

  • SHA512

    8077f47678b5690bc4ba91c6f1eb3da6dddade7ec47e412c30145cebc6e30b8abbbec4606d27dd0e9069a2396363bdf8d40a083caa4682f6ba0dd37ae6bb6e90

  • SSDEEP

    384:LY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZ98+w:0L2s+tRyRpcnurL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NO ICON

C2

fnhost1.ddns.net:1177

Mutex

04de9d8bb4c3f03c2c7f83c303b18ccc

Attributes
  • reg_key

    04de9d8bb4c3f03c2c7f83c303b18ccc

  • splitter

    |'|'|

Targets

    • Target

      d9148d1fe12ddae97026b8b47d6b5788_JaffaCakes118

    • Size

      23KB

    • MD5

      d9148d1fe12ddae97026b8b47d6b5788

    • SHA1

      4c796f8d10628a12ac7947ab04754fbc16e613d6

    • SHA256

      880ab8d8c5c0c1f1de079c6e74400c41106beda935bd7eaad9addecd868e6000

    • SHA512

      8077f47678b5690bc4ba91c6f1eb3da6dddade7ec47e412c30145cebc6e30b8abbbec4606d27dd0e9069a2396363bdf8d40a083caa4682f6ba0dd37ae6bb6e90

    • SSDEEP

      384:LY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZ98+w:0L2s+tRyRpcnurL

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks