General

  • Target

    f3157f27bca1747a36a41f2650d3d2cd_JaffaCakes118

  • Size

    29KB

  • Sample

    240924-hw58vayejc

  • MD5

    f3157f27bca1747a36a41f2650d3d2cd

  • SHA1

    cf90379eb31c4651253d51848bb8f0cbb855b261

  • SHA256

    a9dc248e30b91fe2a559184730a450847233930a7161941b0daf1286f82b44c1

  • SHA512

    986c9c02780807129728e41714729384d2960d5951d9dd21a5321e00c7f899936b889248d28be53147091edc9a2b6719dba33e529cb4bc64561e519b5cf6636a

  • SSDEEP

    384:6tos5l7l7EMrof6oyr/5NxrimmqDWD4IePUGBsbh0w4wlAokw9OhgOL1vYRGOZzg:6F7GMroynbprsq04IePBKh0p29SgRgR

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

ethicalhacking.myftp.biz:1177

Mutex

301b5fcf8ce2fab8868e80b6c1f912fe

Attributes
  • reg_key

    301b5fcf8ce2fab8868e80b6c1f912fe

  • splitter

    |'|'|

Targets

    • Target

      f3157f27bca1747a36a41f2650d3d2cd_JaffaCakes118

    • Size

      29KB

    • MD5

      f3157f27bca1747a36a41f2650d3d2cd

    • SHA1

      cf90379eb31c4651253d51848bb8f0cbb855b261

    • SHA256

      a9dc248e30b91fe2a559184730a450847233930a7161941b0daf1286f82b44c1

    • SHA512

      986c9c02780807129728e41714729384d2960d5951d9dd21a5321e00c7f899936b889248d28be53147091edc9a2b6719dba33e529cb4bc64561e519b5cf6636a

    • SSDEEP

      384:6tos5l7l7EMrof6oyr/5NxrimmqDWD4IePUGBsbh0w4wlAokw9OhgOL1vYRGOZzg:6F7GMroynbprsq04IePBKh0p29SgRgR

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks