General

  • Target

    da9b81f67de42ea54822d37c1c76ce28_JaffaCakes118

  • Size

    37KB

  • Sample

    240911-sfjp1sxapr

  • MD5

    da9b81f67de42ea54822d37c1c76ce28

  • SHA1

    d808bb6d6b7a86dc1d72ae02282247c9fd19fa78

  • SHA256

    b5094a29217921444fee2a1d831fec54a11850b9ac3216731bbb8f9d2ed170ad

  • SHA512

    2c741afd0b60889a25f3ff89c75d063b540832536beb6dde9b3c6c9fbb47cd5cddf8b5783f465479ee1732928d0219847a58a0a6bcb14002af69848be8b45ef1

  • SSDEEP

    384:SWRWUiDZblmJEpRGyEff1PNu0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXLP:rR6HpR9Eff1g0Clm8rM+rMRa8Nu91t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

94.232.65.190:6522

Mutex

d932e816964a335faa4306c27a894319

Attributes
  • reg_key

    d932e816964a335faa4306c27a894319

  • splitter

    |'|'|

Targets

    • Target

      da9b81f67de42ea54822d37c1c76ce28_JaffaCakes118

    • Size

      37KB

    • MD5

      da9b81f67de42ea54822d37c1c76ce28

    • SHA1

      d808bb6d6b7a86dc1d72ae02282247c9fd19fa78

    • SHA256

      b5094a29217921444fee2a1d831fec54a11850b9ac3216731bbb8f9d2ed170ad

    • SHA512

      2c741afd0b60889a25f3ff89c75d063b540832536beb6dde9b3c6c9fbb47cd5cddf8b5783f465479ee1732928d0219847a58a0a6bcb14002af69848be8b45ef1

    • SSDEEP

      384:SWRWUiDZblmJEpRGyEff1PNu0CYSmkhrAF+rMRTyN/0L+EcoinblneHQM3epzXLP:rR6HpR9Eff1g0Clm8rM+rMRa8Nu91t

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks