General

  • Target

    f416b7614aa96da32346db07f3c4667a_JaffaCakes118

  • Size

    585KB

  • Sample

    240924-va3l2stemq

  • MD5

    f416b7614aa96da32346db07f3c4667a

  • SHA1

    6b43e0d89a92bc2cdfaa57dfa19b1b40da17c87d

  • SHA256

    18062c35f3e63d3873008242399d9e0d326352ff16c6b7acc2abc5603e122b5b

  • SHA512

    fd00c65fa189870b27cb1cd87b256bb9f31b6942dd2d62fadfdd9947966950e82524ff7864ff6c845b5eb7568835ed89db0c664e86686d994ae528ccb82eac47

  • SSDEEP

    12288:1La5XviqTBYSKmHflDsbXjkSOW9SQlCv:l4dBptmkB/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

AE

C2

kontolanime.no-ip.biz:523

Mutex

97e922d6619ab287bd2bd9d11fd92dc1

Attributes
  • reg_key

    97e922d6619ab287bd2bd9d11fd92dc1

  • splitter

    |'|'|

Targets

    • Target

      f416b7614aa96da32346db07f3c4667a_JaffaCakes118

    • Size

      585KB

    • MD5

      f416b7614aa96da32346db07f3c4667a

    • SHA1

      6b43e0d89a92bc2cdfaa57dfa19b1b40da17c87d

    • SHA256

      18062c35f3e63d3873008242399d9e0d326352ff16c6b7acc2abc5603e122b5b

    • SHA512

      fd00c65fa189870b27cb1cd87b256bb9f31b6942dd2d62fadfdd9947966950e82524ff7864ff6c845b5eb7568835ed89db0c664e86686d994ae528ccb82eac47

    • SSDEEP

      12288:1La5XviqTBYSKmHflDsbXjkSOW9SQlCv:l4dBptmkB/

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks