General

  • Target

    fc7a1eea4d05a7cad4980f5724f0c30a_JaffaCakes118

  • Size

    46KB

  • Sample

    240928-rmqapszekp

  • MD5

    fc7a1eea4d05a7cad4980f5724f0c30a

  • SHA1

    da5be304a80c79e738dd7b35e221f2349d23a620

  • SHA256

    b260adf79585d2adab17251339114b8a6ceee27694d7c716ee11207988393928

  • SHA512

    ec8aed0ec72e6c04b630e1bef37cd0a0c5e18e1184c3c49cded41a4676bd8696844ad4418b425851c02876b4301bb485251f885854f50a4ac1365bb6f3eff8ff

  • SSDEEP

    768:qqMv+ZW1nRNAzx7SnI1OfoFLhvi0QmIDUu0tiLGj5aH26:zMS2a9RLQVkvjEW6

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

svhost

C2

192.168.100.4:1604

Mutex

fabc31ebe8823518f9ddd5a734669637

Attributes
  • reg_key

    fabc31ebe8823518f9ddd5a734669637

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      fc7a1eea4d05a7cad4980f5724f0c30a_JaffaCakes118

    • Size

      46KB

    • MD5

      fc7a1eea4d05a7cad4980f5724f0c30a

    • SHA1

      da5be304a80c79e738dd7b35e221f2349d23a620

    • SHA256

      b260adf79585d2adab17251339114b8a6ceee27694d7c716ee11207988393928

    • SHA512

      ec8aed0ec72e6c04b630e1bef37cd0a0c5e18e1184c3c49cded41a4676bd8696844ad4418b425851c02876b4301bb485251f885854f50a4ac1365bb6f3eff8ff

    • SSDEEP

      768:qqMv+ZW1nRNAzx7SnI1OfoFLhvi0QmIDUu0tiLGj5aH26:zMS2a9RLQVkvjEW6

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks