General

  • Target

    fb03f5c04c22b6bf67478d420e0d4202_JaffaCakes118

  • Size

    99KB

  • Sample

    240927-2c9xgavfna

  • MD5

    fb03f5c04c22b6bf67478d420e0d4202

  • SHA1

    5e50a63327c150ae1414708ae4677b01d1be1e95

  • SHA256

    03390b7611f4cb7d4ce408663fa2c68574cbb6724158052990838664e8baeb06

  • SHA512

    1f0323b9a7737cf61f53bd8f0b44bc9707d37b85fb7c66b811960648303f58dc402d7ee39fd6cce5be3edadbefe883005e65c944b67bbc62d81190977fe0ce99

  • SSDEEP

    1536:WAp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4nkQ:d5eznsjsguGDFqGn9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      fb03f5c04c22b6bf67478d420e0d4202_JaffaCakes118

    • Size

      99KB

    • MD5

      fb03f5c04c22b6bf67478d420e0d4202

    • SHA1

      5e50a63327c150ae1414708ae4677b01d1be1e95

    • SHA256

      03390b7611f4cb7d4ce408663fa2c68574cbb6724158052990838664e8baeb06

    • SHA512

      1f0323b9a7737cf61f53bd8f0b44bc9707d37b85fb7c66b811960648303f58dc402d7ee39fd6cce5be3edadbefe883005e65c944b67bbc62d81190977fe0ce99

    • SSDEEP

      1536:WAp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4nkQ:d5eznsjsguGDFqGn9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks