General

  • Target

    f29a2274931e575fad1687f2e13be0cc_JaffaCakes118

  • Size

    93KB

  • Sample

    240923-tardcavcma

  • MD5

    f29a2274931e575fad1687f2e13be0cc

  • SHA1

    48e19b444fedb0313590e2f976c4c74f612d5222

  • SHA256

    3d027d9488ecc9b42321a91d0ab62f558b415418ade114024d158def747041d5

  • SHA512

    2c34f0f4c0582b5f272ed0803e5e9982bbfc7a8cb1587ec36e9b4af453540ffd8d1a1286e3fc2a70a90270e0f890bbcc08251d3fe12dff09b4f8e90c0208c17e

  • SSDEEP

    1536:Gw4Ec0HCYnz7a5MzU/jEwzGi1dDgDpgS:GwZHCYnzQMzUEi1dem

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hacked

C2

hakim32.ddns.net:2000

127.0.0.1:5552

Mutex

933b50ceb66c61e2d1f00d0728b5a5f8

Attributes
  • reg_key

    933b50ceb66c61e2d1f00d0728b5a5f8

  • splitter

    |'|'|

Targets

    • Target

      f29a2274931e575fad1687f2e13be0cc_JaffaCakes118

    • Size

      93KB

    • MD5

      f29a2274931e575fad1687f2e13be0cc

    • SHA1

      48e19b444fedb0313590e2f976c4c74f612d5222

    • SHA256

      3d027d9488ecc9b42321a91d0ab62f558b415418ade114024d158def747041d5

    • SHA512

      2c34f0f4c0582b5f272ed0803e5e9982bbfc7a8cb1587ec36e9b4af453540ffd8d1a1286e3fc2a70a90270e0f890bbcc08251d3fe12dff09b4f8e90c0208c17e

    • SSDEEP

      1536:Gw4Ec0HCYnz7a5MzU/jEwzGi1dDgDpgS:GwZHCYnzQMzUEi1dem

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks