General

  • Target

    f945dd5291f1cc7457d7bccb242314c0_JaffaCakes118

  • Size

    23KB

  • Sample

    240926-2gnj2a1emr

  • MD5

    f945dd5291f1cc7457d7bccb242314c0

  • SHA1

    de72c1fd6f1f7a9bd02b2de2747c173de83a4162

  • SHA256

    62dc074f1ae5093effdea892ad6fd5c30506fab0a7ce508912d17fe63f9cbb81

  • SHA512

    02acea3115696bd020074547740d0f4dd72c691f41957e6944863ebab4b6196a5f585551f7f72156ea81a9f108e86b79f5426c5aa9f99cefc01d560398327a97

  • SSDEEP

    384:dc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9H9mRvR6JZlbw8hqIusZzZar5g:3e9EJLN/WRpcnuLNg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MONSTER

C2

agx1996.ddns.net:5522

Mutex

38921ef0ea6ccfe30ec6445068ee1172

Attributes
  • reg_key

    38921ef0ea6ccfe30ec6445068ee1172

  • splitter

    |'|'|

Targets

    • Target

      f945dd5291f1cc7457d7bccb242314c0_JaffaCakes118

    • Size

      23KB

    • MD5

      f945dd5291f1cc7457d7bccb242314c0

    • SHA1

      de72c1fd6f1f7a9bd02b2de2747c173de83a4162

    • SHA256

      62dc074f1ae5093effdea892ad6fd5c30506fab0a7ce508912d17fe63f9cbb81

    • SHA512

      02acea3115696bd020074547740d0f4dd72c691f41957e6944863ebab4b6196a5f585551f7f72156ea81a9f108e86b79f5426c5aa9f99cefc01d560398327a97

    • SSDEEP

      384:dc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9H9mRvR6JZlbw8hqIusZzZar5g:3e9EJLN/WRpcnuLNg

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks