General

  • Target

    fd12ad5947e83d65c181db1ec4bbe214_JaffaCakes118

  • Size

    37KB

  • Sample

    240928-y4jb2sxfjf

  • MD5

    fd12ad5947e83d65c181db1ec4bbe214

  • SHA1

    494d0349697f7bd8e5070b1d1f74156f986cf611

  • SHA256

    e7a1faa506b5a48641fd51224b4b9a5da0c39698eaa6c2f58902690ae2645196

  • SHA512

    fdf3478853b91d8f4597eda1b2093eac5c7de85bf32c1e4af6e534789e543e037b468fb6386cec7450f16bb846c587446c20933b5f6389622d2f90fcfaf5e084

  • SSDEEP

    384:78iKMizdnjnBhFbJ8ycPzNX9Bwy2JlrAF+rMRTyN/0L+EcoinblneHQM3epzX8NV:wignlLJfcPzNXt2LrM+rMRa8NuaBt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

svalkabomja333.hopto.org:1978

Mutex

ebdf784e4c631a8b558a06107e351925

Attributes
  • reg_key

    ebdf784e4c631a8b558a06107e351925

  • splitter

    |'|'|

Targets

    • Target

      fd12ad5947e83d65c181db1ec4bbe214_JaffaCakes118

    • Size

      37KB

    • MD5

      fd12ad5947e83d65c181db1ec4bbe214

    • SHA1

      494d0349697f7bd8e5070b1d1f74156f986cf611

    • SHA256

      e7a1faa506b5a48641fd51224b4b9a5da0c39698eaa6c2f58902690ae2645196

    • SHA512

      fdf3478853b91d8f4597eda1b2093eac5c7de85bf32c1e4af6e534789e543e037b468fb6386cec7450f16bb846c587446c20933b5f6389622d2f90fcfaf5e084

    • SSDEEP

      384:78iKMizdnjnBhFbJ8ycPzNX9Bwy2JlrAF+rMRTyN/0L+EcoinblneHQM3epzX8NV:wignlLJfcPzNXt2LrM+rMRa8NuaBt

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks