General

  • Target

    df945f06a326dce494df8731b01f050a_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240914-f682daygrg

  • MD5

    df945f06a326dce494df8731b01f050a

  • SHA1

    ce76fb5ea33e9d1c3067fdb5c80c70b3962d9199

  • SHA256

    2118b9a82b361a965d3e839f8327f822b65576d6cc70e7767cf00f3a01123e19

  • SHA512

    f766e40b13e1b3cb7a86d8c82e5b1cddf143369c3702b6c4343c8e4ce445bc0673881667874e25c864ebfff2f8776fb8a8abdae7351300fdeafe3235c0db0c96

  • SSDEEP

    24576:kXE054bS4ubvi1xJdb4kkoG3XX/cuSBNdlFUGS61XTi2B+/i76:kFybSnW7Jafo6cu0SGS4XTii+/k

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

WireGroups

C2

212.83.167.116:1604

Mutex

7473a740ee91b3e5852f17361da1e49f

Attributes
  • reg_key

    7473a740ee91b3e5852f17361da1e49f

  • splitter

    |'|'|

Targets

    • Target

      df945f06a326dce494df8731b01f050a_JaffaCakes118

    • Size

      1.4MB

    • MD5

      df945f06a326dce494df8731b01f050a

    • SHA1

      ce76fb5ea33e9d1c3067fdb5c80c70b3962d9199

    • SHA256

      2118b9a82b361a965d3e839f8327f822b65576d6cc70e7767cf00f3a01123e19

    • SHA512

      f766e40b13e1b3cb7a86d8c82e5b1cddf143369c3702b6c4343c8e4ce445bc0673881667874e25c864ebfff2f8776fb8a8abdae7351300fdeafe3235c0db0c96

    • SSDEEP

      24576:kXE054bS4ubvi1xJdb4kkoG3XX/cuSBNdlFUGS61XTi2B+/i76:kFybSnW7Jafo6cu0SGS4XTii+/k

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks