General

  • Target

    daaf8458dfe84edde3dc9baa54803e60_JaffaCakes118

  • Size

    23KB

  • Sample

    240911-s7tdjayhmg

  • MD5

    daaf8458dfe84edde3dc9baa54803e60

  • SHA1

    15d83ee0e79e45b0e71adb865592e1563a6ea322

  • SHA256

    d8e4ea6187c8285cc39bc9eca06662c92853b3df2fd9db8e6e253fe684cc08f5

  • SHA512

    ed450d5f3f460c321406459eecc7521495a66a87f8c22b6fb68811a282bdd59ba0342b388d1cac7323cfcedc0518776b3776131032b2b65cee818442eb31d12e

  • SSDEEP

    384:ysqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZxi:Nf65K2Yf1jKRpcnuv

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

remygeek.ddns.net:1177

Mutex

224a50c1d7bcfe0386e79170796df188

Attributes
  • reg_key

    224a50c1d7bcfe0386e79170796df188

  • splitter

    |'|'|

Targets

    • Target

      daaf8458dfe84edde3dc9baa54803e60_JaffaCakes118

    • Size

      23KB

    • MD5

      daaf8458dfe84edde3dc9baa54803e60

    • SHA1

      15d83ee0e79e45b0e71adb865592e1563a6ea322

    • SHA256

      d8e4ea6187c8285cc39bc9eca06662c92853b3df2fd9db8e6e253fe684cc08f5

    • SHA512

      ed450d5f3f460c321406459eecc7521495a66a87f8c22b6fb68811a282bdd59ba0342b388d1cac7323cfcedc0518776b3776131032b2b65cee818442eb31d12e

    • SSDEEP

      384:ysqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZxi:Nf65K2Yf1jKRpcnuv

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks