General

  • Target

    fd7db905ab900759fa495e8bf037c3e4_JaffaCakes118

  • Size

    380KB

  • Sample

    240929-bbsnpatcpr

  • MD5

    fd7db905ab900759fa495e8bf037c3e4

  • SHA1

    5ff36850290b1cfe38465534e7455a0b207bff78

  • SHA256

    6547177b230c2b33c7f699afbee2a11a08e7201d94c93621e51f75c8780534e7

  • SHA512

    b49a33e54a9674ab0a8ab2bfe3d4609a15c8481aa4605c61d611f1aa688768636596b82a0897f3e2204b8425fdaa1412f1a9e2832d58fe1d464d354c843d494c

  • SSDEEP

    6144:s9eh7r3r9panVwDnCZYnjiCb1VMoQz95t6TknxqbtkMQGb1/QH1:R7DMoQz954TkopkMQGbKV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

xXxMrMo0MeNxXx

C2

google32.sytes.net:8888

Mutex

786911771d8dc9df40e00fd12ea1d0ce

Attributes
  • reg_key

    786911771d8dc9df40e00fd12ea1d0ce

  • splitter

    |'|'|

Targets

    • Target

      fd7db905ab900759fa495e8bf037c3e4_JaffaCakes118

    • Size

      380KB

    • MD5

      fd7db905ab900759fa495e8bf037c3e4

    • SHA1

      5ff36850290b1cfe38465534e7455a0b207bff78

    • SHA256

      6547177b230c2b33c7f699afbee2a11a08e7201d94c93621e51f75c8780534e7

    • SHA512

      b49a33e54a9674ab0a8ab2bfe3d4609a15c8481aa4605c61d611f1aa688768636596b82a0897f3e2204b8425fdaa1412f1a9e2832d58fe1d464d354c843d494c

    • SSDEEP

      6144:s9eh7r3r9panVwDnCZYnjiCb1VMoQz95t6TknxqbtkMQGb1/QH1:R7DMoQz954TkopkMQGbKV

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks