General

  • Target

    eade534945eceadfc259a4757b04eea8_JaffaCakes118

  • Size

    123KB

  • Sample

    240919-jhl4gsxeqg

  • MD5

    eade534945eceadfc259a4757b04eea8

  • SHA1

    4ae86826b1e4550b606de12adefc782f95af67ea

  • SHA256

    ded328da0fb7e26887ca2c85e342223b9c7c5eae47959601c7dc0a3dc314938b

  • SHA512

    88cb1717f4cf1ce722593acb90b0ef9bc3193e56fa22439120b97d497e794ac1079676b79cf359d021de684ad43acf808261c3541aeaea0ca0ebe667ce2b3a90

  • SSDEEP

    3072:WJiw5lLprlEymSEix9HLEN8P2rV8XDc8:WJiALbEy7XEN8P2rwc8

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:58157

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      eade534945eceadfc259a4757b04eea8_JaffaCakes118

    • Size

      123KB

    • MD5

      eade534945eceadfc259a4757b04eea8

    • SHA1

      4ae86826b1e4550b606de12adefc782f95af67ea

    • SHA256

      ded328da0fb7e26887ca2c85e342223b9c7c5eae47959601c7dc0a3dc314938b

    • SHA512

      88cb1717f4cf1ce722593acb90b0ef9bc3193e56fa22439120b97d497e794ac1079676b79cf359d021de684ad43acf808261c3541aeaea0ca0ebe667ce2b3a90

    • SSDEEP

      3072:WJiw5lLprlEymSEix9HLEN8P2rV8XDc8:WJiALbEy7XEN8P2rwc8

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks