General

  • Target

    ff70095137235f6ca0adde65cf76d52b_JaffaCakes118

  • Size

    25KB

  • Sample

    240929-2tta2sthmp

  • MD5

    ff70095137235f6ca0adde65cf76d52b

  • SHA1

    6d58603b98c1e5ff21a65c8db1d9a76363c37b26

  • SHA256

    91aeac27a8ca345eaa6926aecaf8868888d5b14e1164b54d3c57fec6aedef22e

  • SHA512

    4a526b173eb3b78580962be6c11792b8fc84a2d9fcc5d680b9ab92f5c00c65f0ca307f2c878778194e80b30683c3f738ff5e12e8cab5d6aeeacefc3535f626aa

  • SSDEEP

    384:bc6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZ2KXNek+vD:AIU0tw3RpcnuW

Malware Config

Extracted

Family

njrat

Version

Madest 0.7d

Botnet

Microsoft

C2

kirya.hopto.org:1604

Mutex

3b0993c80a0a836b6ed4d0b2940db392

Attributes
  • reg_key

    3b0993c80a0a836b6ed4d0b2940db392

  • splitter

    |'|'|

Targets

    • Target

      ff70095137235f6ca0adde65cf76d52b_JaffaCakes118

    • Size

      25KB

    • MD5

      ff70095137235f6ca0adde65cf76d52b

    • SHA1

      6d58603b98c1e5ff21a65c8db1d9a76363c37b26

    • SHA256

      91aeac27a8ca345eaa6926aecaf8868888d5b14e1164b54d3c57fec6aedef22e

    • SHA512

      4a526b173eb3b78580962be6c11792b8fc84a2d9fcc5d680b9ab92f5c00c65f0ca307f2c878778194e80b30683c3f738ff5e12e8cab5d6aeeacefc3535f626aa

    • SSDEEP

      384:bc6CqbFYh3odrVCGiHssDB4b6i6fgpEupNXRmRvR6JZlbw8hqIusZzZ2KXNek+vD:AIU0tw3RpcnuW

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks