General

  • Target

    d9692372935af6488f394ac6bb54abcd_JaffaCakes118

  • Size

    78KB

  • Sample

    240911-cd6trsxhqb

  • MD5

    d9692372935af6488f394ac6bb54abcd

  • SHA1

    e027975d43f867f7f975ab70931c4dedfc34fcbe

  • SHA256

    857c0557be413c9659bd43033085ff241ddb5c89f4a0cef4ad200878b4f43368

  • SHA512

    d5194a7affb374418597656e399680058c80462ee8e3d7875d09e33362bd3506ddc8e16d623528378cda6947c09b40fbe8bc05de319c4c0c1cc800ab5da6daa2

  • SSDEEP

    1536:+EXJoENDDVGHIdsF16EczfDO8JNGPfRYZMw/y0K/Kq:+sJoIdsF16zJJNGnRYZJa0K/Kq

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

107.150.12.44:14532

Mutex

9e12b36449cc78d34159a3c000b6fc6a

Attributes
  • reg_key

    9e12b36449cc78d34159a3c000b6fc6a

  • splitter

    |'|'|

Targets

    • Target

      d9692372935af6488f394ac6bb54abcd_JaffaCakes118

    • Size

      78KB

    • MD5

      d9692372935af6488f394ac6bb54abcd

    • SHA1

      e027975d43f867f7f975ab70931c4dedfc34fcbe

    • SHA256

      857c0557be413c9659bd43033085ff241ddb5c89f4a0cef4ad200878b4f43368

    • SHA512

      d5194a7affb374418597656e399680058c80462ee8e3d7875d09e33362bd3506ddc8e16d623528378cda6947c09b40fbe8bc05de319c4c0c1cc800ab5da6daa2

    • SSDEEP

      1536:+EXJoENDDVGHIdsF16EczfDO8JNGPfRYZMw/y0K/Kq:+sJoIdsF16zJJNGnRYZJa0K/Kq

    • Modifies WinLogon for persistence

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks