General

  • Target

    fdf1fa9d34f84fdc822fbfde0cc45c62_JaffaCakes118

  • Size

    23KB

  • Sample

    240929-gyh1navgkf

  • MD5

    fdf1fa9d34f84fdc822fbfde0cc45c62

  • SHA1

    2440ac917fc11364d8c2c845e8c349a82681527d

  • SHA256

    2fda3eebcc3e73d2fcd4b5a3c5092b3b0b1cf56fb6e9915de9f69bdbc1dd40cb

  • SHA512

    4e256b5074910788ca837135bd4701711aa4709ff9ef90dbe9b36f20c86ad0013d0dc3d3c276db105c267534fe4b859ae881c781b77d39402f4d4d3d78d68ede

  • SSDEEP

    384:ozluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZlF/:ocOmhtIiRpcnuA

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

javaclients.hopto.org:5553

Mutex

68ff17a2ca62d590e8a5b84f0c8ebb62

Attributes
  • reg_key

    68ff17a2ca62d590e8a5b84f0c8ebb62

  • splitter

    |'|'|

Targets

    • Target

      fdf1fa9d34f84fdc822fbfde0cc45c62_JaffaCakes118

    • Size

      23KB

    • MD5

      fdf1fa9d34f84fdc822fbfde0cc45c62

    • SHA1

      2440ac917fc11364d8c2c845e8c349a82681527d

    • SHA256

      2fda3eebcc3e73d2fcd4b5a3c5092b3b0b1cf56fb6e9915de9f69bdbc1dd40cb

    • SHA512

      4e256b5074910788ca837135bd4701711aa4709ff9ef90dbe9b36f20c86ad0013d0dc3d3c276db105c267534fe4b859ae881c781b77d39402f4d4d3d78d68ede

    • SSDEEP

      384:ozluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZlF/:ocOmhtIiRpcnuA

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks