General

  • Target

    e18b82b85f62e145fc105302df37a8af_JaffaCakes118

  • Size

    37KB

  • Sample

    240915-c4yk3s1gkq

  • MD5

    e18b82b85f62e145fc105302df37a8af

  • SHA1

    0f53fcc65db61c52c383d7c16301f815b97312dd

  • SHA256

    2d6a60fa56688f81b3b1ecebf2eb1ae9b44f41a9e070916c93e3f85dd841d174

  • SHA512

    cae517bad6ebb0a3255c9a8a445323015d33c649a279eff01e06ced6d9b63697c763e39e01adec92677fe0d7d10cebd1505a27f37dfefcb38ca6ae96a37961eb

  • SSDEEP

    384:xV2m3hUidkiXR21cGMy8PuuRXBiFlK6IurAF+rMRTyN/0L+EcoinblneHQM3epzm:n2m3VLGv8PuuR066XrM+rMRa8Nuc5t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

91.105.239.37:7777

Mutex

08375d67207c17f4c38ba60e0c94919a

Attributes
  • reg_key

    08375d67207c17f4c38ba60e0c94919a

  • splitter

    |'|'|

Targets

    • Target

      e18b82b85f62e145fc105302df37a8af_JaffaCakes118

    • Size

      37KB

    • MD5

      e18b82b85f62e145fc105302df37a8af

    • SHA1

      0f53fcc65db61c52c383d7c16301f815b97312dd

    • SHA256

      2d6a60fa56688f81b3b1ecebf2eb1ae9b44f41a9e070916c93e3f85dd841d174

    • SHA512

      cae517bad6ebb0a3255c9a8a445323015d33c649a279eff01e06ced6d9b63697c763e39e01adec92677fe0d7d10cebd1505a27f37dfefcb38ca6ae96a37961eb

    • SSDEEP

      384:xV2m3hUidkiXR21cGMy8PuuRXBiFlK6IurAF+rMRTyN/0L+EcoinblneHQM3epzm:n2m3VLGv8PuuR066XrM+rMRa8Nuc5t

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks