General

  • Target

    ea722b61e3266bcf21c0edd6321e1d80_JaffaCakes118

  • Size

    23KB

  • Sample

    240919-c91bvsxcll

  • MD5

    ea722b61e3266bcf21c0edd6321e1d80

  • SHA1

    b021bfbfd8c971b918a8976db9c22e62d9e4fa83

  • SHA256

    cfe0943ea56ef9d41e6d75871458662c57d55020f3dcf7999fbf888b7dfc08ef

  • SHA512

    e085c454f424957e29abe521ef631e66dc9d839fd980c203131e042cfb5573d28aee183e728cd3a874ce73416fd4eb397655ca1599bd599d7cc166ee393b13a0

  • SSDEEP

    384:Vr1MKFYuEEhERvoBG16Xuy0MHNw6Tg1Y+75JTFmRvR6JZlbw8hqIusZzZoEI:Vr+W4V6+yDRpcnu7d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

zerip.ddns.net:1177

Mutex

24c81bd0d2631bb6cbe3f3973e42798d

Attributes
  • reg_key

    24c81bd0d2631bb6cbe3f3973e42798d

  • splitter

    |'|'|

Targets

    • Target

      ea722b61e3266bcf21c0edd6321e1d80_JaffaCakes118

    • Size

      23KB

    • MD5

      ea722b61e3266bcf21c0edd6321e1d80

    • SHA1

      b021bfbfd8c971b918a8976db9c22e62d9e4fa83

    • SHA256

      cfe0943ea56ef9d41e6d75871458662c57d55020f3dcf7999fbf888b7dfc08ef

    • SHA512

      e085c454f424957e29abe521ef631e66dc9d839fd980c203131e042cfb5573d28aee183e728cd3a874ce73416fd4eb397655ca1599bd599d7cc166ee393b13a0

    • SSDEEP

      384:Vr1MKFYuEEhERvoBG16Xuy0MHNw6Tg1Y+75JTFmRvR6JZlbw8hqIusZzZoEI:Vr+W4V6+yDRpcnu7d

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks