General

  • Target

    eade4b1b81bbe130f60de0aa4932be6e_JaffaCakes118

  • Size

    43KB

  • Sample

    240919-jhk67axeqf

  • MD5

    eade4b1b81bbe130f60de0aa4932be6e

  • SHA1

    70ff7e159df53043ad9204965b27539929679068

  • SHA256

    740ee7f71f72705e2098e4171df52c5c822c457b13d9854f9d10657bc9f3622b

  • SHA512

    2467ea1f6b2adc5d4ad5f3188048219876906defa358dff3e037035153df5ac32da6b4577a47174fd5cdfca8a03dec6e05dd16184b4674bb03beda77250c7a6c

  • SSDEEP

    768:u9YUIDSC40/Ex2iLdzVL/bycmfEaSSHH13nNG1:u3C4cEHpVLXyEVSBs

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

ecc7c8c51c0850c1ec247c7fd3602f20

Attributes
  • reg_key

    ecc7c8c51c0850c1ec247c7fd3602f20

  • splitter

    |'|'|

Targets

    • Target

      eade4b1b81bbe130f60de0aa4932be6e_JaffaCakes118

    • Size

      43KB

    • MD5

      eade4b1b81bbe130f60de0aa4932be6e

    • SHA1

      70ff7e159df53043ad9204965b27539929679068

    • SHA256

      740ee7f71f72705e2098e4171df52c5c822c457b13d9854f9d10657bc9f3622b

    • SHA512

      2467ea1f6b2adc5d4ad5f3188048219876906defa358dff3e037035153df5ac32da6b4577a47174fd5cdfca8a03dec6e05dd16184b4674bb03beda77250c7a6c

    • SSDEEP

      768:u9YUIDSC40/Ex2iLdzVL/bycmfEaSSHH13nNG1:u3C4cEHpVLXyEVSBs

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks