General

  • Target

    e7760be9e9de2e60a3d88db653f0ccc2_JaffaCakes118

  • Size

    230KB

  • Sample

    240917-w9a7hsybqq

  • MD5

    e7760be9e9de2e60a3d88db653f0ccc2

  • SHA1

    8626621983b000cd4a72c97c15fdf1bdeddbeb7d

  • SHA256

    c5cf8105413defda0a323c1c2133a479e83d0696476d138d1bea3488d1a94738

  • SHA512

    0818da53f28f441886b186e2ac79f6d4f977ca3601bdac8dc7f494f63afce11f5cad215773faf645241440b97b8e93ba81979e1038268c6f1d33c145d0d5a6ff

  • SSDEEP

    6144:ilqGW2Xg5givwxMxr+cJIvmQQqzetd1UfJAw9mUVIAkcKTUul:CqEXgS+eCIvmPk6iVfLkcKtl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:80

Mutex

1db1ae237e6f59ba4ea496d20bffd3b9

Attributes
  • reg_key

    1db1ae237e6f59ba4ea496d20bffd3b9

  • splitter

    |'|'|

Targets

    • Target

      Follow Bot.exe

    • Size

      262KB

    • MD5

      5004792993bebe85f15a201e52b96d82

    • SHA1

      2f9b00a5cba3c5f8763529dd145ab9d292220bce

    • SHA256

      6954f9517e8abb2fbbc90074bbbdf6aac2e28b6ea2a59b5e40b077bc287b139e

    • SHA512

      4c451c07cde5449159ec39099d3ba437f8869410b745471b2c287fccbfe4d8dd80f75102fa397afb7f45f10b07cb3427cf70e1cb74779bc67aa3c684c7ff98f0

    • SSDEEP

      6144:qNI5xXe91xOmkOHi8IvlmA4slVoWpvC9hd:jxSvavlmA4slVoWohd

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks