General

  • Target

    fc7ed11225707bb03a06a6e3b6b06f04_JaffaCakes118

  • Size

    31KB

  • Sample

    240928-rvda4staqc

  • MD5

    fc7ed11225707bb03a06a6e3b6b06f04

  • SHA1

    ecda25ee858992a96c1d01e65ab359ef33da8c9b

  • SHA256

    434c3b5ab0a2b53e04e4cdf6df69ab626919e3f5b9cffde95e178fe975d463b4

  • SHA512

    02a33c11e26614320a707bc5f8ec89cfad3e23aef596759071ebc7b76702602eb56717f4d3be7711370cc8b749a7be28bdadd7299957b614ecf5ed47d6ab8c82

  • SSDEEP

    768:m7h0/b13hdwzxLy3mMzS/LYVvshQmIDUu0ti7Usj:44Z6wYyQQVkaj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Zombie

C2

tmvlflt.p-e.kr:1

Mutex

bd9defde5bca6ae254f0613ef4c03b4a

Attributes
  • reg_key

    bd9defde5bca6ae254f0613ef4c03b4a

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      fc7ed11225707bb03a06a6e3b6b06f04_JaffaCakes118

    • Size

      31KB

    • MD5

      fc7ed11225707bb03a06a6e3b6b06f04

    • SHA1

      ecda25ee858992a96c1d01e65ab359ef33da8c9b

    • SHA256

      434c3b5ab0a2b53e04e4cdf6df69ab626919e3f5b9cffde95e178fe975d463b4

    • SHA512

      02a33c11e26614320a707bc5f8ec89cfad3e23aef596759071ebc7b76702602eb56717f4d3be7711370cc8b749a7be28bdadd7299957b614ecf5ed47d6ab8c82

    • SSDEEP

      768:m7h0/b13hdwzxLy3mMzS/LYVvshQmIDUu0ti7Usj:44Z6wYyQQVkaj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.