General

  • Target

    fb208e0c16a9f0429f74790360279064_JaffaCakes118

  • Size

    317KB

  • Sample

    240927-3vqrzsyckg

  • MD5

    fb208e0c16a9f0429f74790360279064

  • SHA1

    f17b9c0d7761412ccf60f81ff6b6b93a2678a5b3

  • SHA256

    86ebe1fa6a22476b626674e022b22fc47ff62d076ca224533952fd98e79da6aa

  • SHA512

    183d360b2cf1935a7c31b942dd745f6e95f2c63e5872185ae47eb07e1aad3984d63630ae2f3e55dae5b9314a1d9341f261c24db7f22add37b10c970ec34685f9

  • SSDEEP

    6144:zIIcrXQ4S33w614mazUBHfSdocWYD24O/X+tGfnDUQPmx7:9crNS33L10QdrXP/X+tGfnDUQPO7

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

VK

C2

popeyeth.mooo.com:27018

Mutex

87736a04cc0c0a483461bb74827da123

Attributes
  • reg_key

    87736a04cc0c0a483461bb74827da123

  • splitter

    |'|'|

Targets

    • Target

      fb208e0c16a9f0429f74790360279064_JaffaCakes118

    • Size

      317KB

    • MD5

      fb208e0c16a9f0429f74790360279064

    • SHA1

      f17b9c0d7761412ccf60f81ff6b6b93a2678a5b3

    • SHA256

      86ebe1fa6a22476b626674e022b22fc47ff62d076ca224533952fd98e79da6aa

    • SHA512

      183d360b2cf1935a7c31b942dd745f6e95f2c63e5872185ae47eb07e1aad3984d63630ae2f3e55dae5b9314a1d9341f261c24db7f22add37b10c970ec34685f9

    • SSDEEP

      6144:zIIcrXQ4S33w614mazUBHfSdocWYD24O/X+tGfnDUQPmx7:9crNS33L10QdrXP/X+tGfnDUQPO7

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks