General

  • Target

    ff549236bf0eebcc655dc7ccbc5e0691_JaffaCakes118

  • Size

    37KB

  • Sample

    240929-zt5b7svang

  • MD5

    ff549236bf0eebcc655dc7ccbc5e0691

  • SHA1

    0431e4267984b5de5c0eb54d377bc43e3b377543

  • SHA256

    8b2c5362887dbc350aae004bee2ea50b83aee63bdb1d88c2559672e9ca5b91d5

  • SHA512

    5370206ec541ab84f19b2a3702947b33cf4818997edcc3540a86088f55fa5719031f4cca3f0c92bfc442431f5dc3e48a2ff67740496f01985551b185b0165ab4

  • SSDEEP

    384:DCDvkit2Zf5W9cTYXyc/lPM20zHFmnPuhurAF+rMRTyN/0L+EcoinblneHQM3epR:WDqjjTYic/lkEPuYrM+rMRa8NuO65t

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

helo

C2

93.80.143.211:1604

Mutex

47f1deea0f314fac938e8c16bcba8b2b

Attributes
  • reg_key

    47f1deea0f314fac938e8c16bcba8b2b

  • splitter

    |'|'|

Targets

    • Target

      ff549236bf0eebcc655dc7ccbc5e0691_JaffaCakes118

    • Size

      37KB

    • MD5

      ff549236bf0eebcc655dc7ccbc5e0691

    • SHA1

      0431e4267984b5de5c0eb54d377bc43e3b377543

    • SHA256

      8b2c5362887dbc350aae004bee2ea50b83aee63bdb1d88c2559672e9ca5b91d5

    • SHA512

      5370206ec541ab84f19b2a3702947b33cf4818997edcc3540a86088f55fa5719031f4cca3f0c92bfc442431f5dc3e48a2ff67740496f01985551b185b0165ab4

    • SSDEEP

      384:DCDvkit2Zf5W9cTYXyc/lPM20zHFmnPuhurAF+rMRTyN/0L+EcoinblneHQM3epR:WDqjjTYic/lkEPuYrM+rMRa8NuO65t

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks