General

  • Target

    dc5aa9e4f775253140a163a03fd485ce_JaffaCakes118

  • Size

    3.7MB

  • Sample

    240912-qrqxcswhnb

  • MD5

    dc5aa9e4f775253140a163a03fd485ce

  • SHA1

    d43266b7fa53cebe7cc3ebfce2963e734f6f3c95

  • SHA256

    a96ce86de4328436269c41dae4036c6046ef115c51fb7647a89acafc476a36b0

  • SHA512

    889858cc3eed10e036d3c4aae21dca04dd8ae771b5d53b470b5d1eed5679cbf158edbcb26818308066ab3a26534b2a18d59f20d367281aab4817b0538f6b276f

  • SSDEEP

    49152:6mMs5NExiG6oe8Lqok7/unsMIStCGNtMPL0V8Mh4hcTUWwb9x5AwGZarB8myUDA2:6VsyiWeIqEsMISXg0V8Mw118EdMUDAM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

GENRAM MOTO

C2

milla.publicvm.com:1177

Mutex

c1e444094e4e1836ba8400b3d476c9ef

Attributes
  • reg_key

    c1e444094e4e1836ba8400b3d476c9ef

  • splitter

    |'|'|

Targets

    • Target

      dc5aa9e4f775253140a163a03fd485ce_JaffaCakes118

    • Size

      3.7MB

    • MD5

      dc5aa9e4f775253140a163a03fd485ce

    • SHA1

      d43266b7fa53cebe7cc3ebfce2963e734f6f3c95

    • SHA256

      a96ce86de4328436269c41dae4036c6046ef115c51fb7647a89acafc476a36b0

    • SHA512

      889858cc3eed10e036d3c4aae21dca04dd8ae771b5d53b470b5d1eed5679cbf158edbcb26818308066ab3a26534b2a18d59f20d367281aab4817b0538f6b276f

    • SSDEEP

      49152:6mMs5NExiG6oe8Lqok7/unsMIStCGNtMPL0V8Mh4hcTUWwb9x5AwGZarB8myUDA2:6VsyiWeIqEsMISXg0V8Mw118EdMUDAM

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks