General

  • Target

    e80ae0e554e1e50e1729d3fbbf717624_JaffaCakes118

  • Size

    327KB

  • Sample

    240918-bje3kavbmd

  • MD5

    e80ae0e554e1e50e1729d3fbbf717624

  • SHA1

    4a076b65726174302480f48384b125444b36a309

  • SHA256

    1a8708424a44533f524fbf76276737e69d4f97588dd8b4a80f78b22e87b9cf2e

  • SHA512

    fe62541b548783d4c9d61891325305beef11569595ffcd5b989523ad07e195f8f01de740a727c113a75aadc1aeb6d06a04f4f44dc5b5b2483b0143db504ca58c

  • SSDEEP

    3072:j6TeodPeygFKkDwG+K2c2ZLRU3y/Xes1AQ7/oGOcHYl6kweaDjBwA4YDqsVfrih:js9CKMQDneUA6HYQrdHZ2sVjih

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

windowsdotnet.ddns.net:1700

Mutex

5bbde28dd0efc1008f97de5aa76d7b7c

Attributes
  • reg_key

    5bbde28dd0efc1008f97de5aa76d7b7c

  • splitter

    |'|'|

Targets

    • Target

      e80ae0e554e1e50e1729d3fbbf717624_JaffaCakes118

    • Size

      327KB

    • MD5

      e80ae0e554e1e50e1729d3fbbf717624

    • SHA1

      4a076b65726174302480f48384b125444b36a309

    • SHA256

      1a8708424a44533f524fbf76276737e69d4f97588dd8b4a80f78b22e87b9cf2e

    • SHA512

      fe62541b548783d4c9d61891325305beef11569595ffcd5b989523ad07e195f8f01de740a727c113a75aadc1aeb6d06a04f4f44dc5b5b2483b0143db504ca58c

    • SSDEEP

      3072:j6TeodPeygFKkDwG+K2c2ZLRU3y/Xes1AQ7/oGOcHYl6kweaDjBwA4YDqsVfrih:js9CKMQDneUA6HYQrdHZ2sVjih

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks