General

  • Target

    efefbca8d55a6d05c2a8091636e5eecc_JaffaCakes118

  • Size

    23KB

  • Sample

    240921-q69ysawapj

  • MD5

    efefbca8d55a6d05c2a8091636e5eecc

  • SHA1

    7a1ae289e864a639cb2849a3ce8d927b5fb06b93

  • SHA256

    0356d3addd7765ab6b6a99e927fc8fe7adc82e884bcc3619209ea5b25a51e300

  • SHA512

    b01bfbbc6d68dcc280d644ff0bd2053c1bed948a6af9f2971ad54fc95d42928af95c99d7da97d6bcfa050342a27338769ab3db2ef01d378c92c83b9e76352c9a

  • SSDEEP

    384:dluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZ7qbu:yOmhtIiRpcnuEF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

bulletofmercy.ddns.net:5552

Mutex

f8740a01d15f833617e77468de51f590

Attributes
  • reg_key

    f8740a01d15f833617e77468de51f590

  • splitter

    |'|'|

Targets

    • Target

      efefbca8d55a6d05c2a8091636e5eecc_JaffaCakes118

    • Size

      23KB

    • MD5

      efefbca8d55a6d05c2a8091636e5eecc

    • SHA1

      7a1ae289e864a639cb2849a3ce8d927b5fb06b93

    • SHA256

      0356d3addd7765ab6b6a99e927fc8fe7adc82e884bcc3619209ea5b25a51e300

    • SHA512

      b01bfbbc6d68dcc280d644ff0bd2053c1bed948a6af9f2971ad54fc95d42928af95c99d7da97d6bcfa050342a27338769ab3db2ef01d378c92c83b9e76352c9a

    • SSDEEP

      384:dluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZ7qbu:yOmhtIiRpcnuEF

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks