General

  • Target

    d9578bd7fed550caca103c1a616a78c6_JaffaCakes118

  • Size

    37KB

  • Sample

    240911-bhhgaswbqe

  • MD5

    d9578bd7fed550caca103c1a616a78c6

  • SHA1

    27904628fe5c6f10dab7974c435c98ec19208ff4

  • SHA256

    1387408972d7d8c9025568a49ac858ec129045cf00b921a0d5bb650e10a4b515

  • SHA512

    92249ece1a3627249e6bf21bef7994afba6e9a896441aa488cc0304e410d6c4e346a164cd7506ce4cb5a4c30532a771d729b2ba3428163cc6b574cf3b526af49

  • SSDEEP

    384:Ie1gck9sgwi+jx3+j/NSysz6eEPLS3mM+zrAF+rMRTyN/0L+EcoinblneHQM3epV:F1HkWhCNhsz6eE+WMQrM+rMRa8NuTNt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

192.168.18.235:1604

Mutex

ea3dece03c0d1db1b6e2c1f45ca52b1c

Attributes
  • reg_key

    ea3dece03c0d1db1b6e2c1f45ca52b1c

  • splitter

    |'|'|

Targets

    • Target

      d9578bd7fed550caca103c1a616a78c6_JaffaCakes118

    • Size

      37KB

    • MD5

      d9578bd7fed550caca103c1a616a78c6

    • SHA1

      27904628fe5c6f10dab7974c435c98ec19208ff4

    • SHA256

      1387408972d7d8c9025568a49ac858ec129045cf00b921a0d5bb650e10a4b515

    • SHA512

      92249ece1a3627249e6bf21bef7994afba6e9a896441aa488cc0304e410d6c4e346a164cd7506ce4cb5a4c30532a771d729b2ba3428163cc6b574cf3b526af49

    • SSDEEP

      384:Ie1gck9sgwi+jx3+j/NSysz6eEPLS3mM+zrAF+rMRTyN/0L+EcoinblneHQM3epV:F1HkWhCNhsz6eE+WMQrM+rMRa8NuTNt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks