General

  • Target

    ff934f661ccfc4b42a7ff923552f39ae_JaffaCakes118

  • Size

    97KB

  • Sample

    240930-asggbascle

  • MD5

    ff934f661ccfc4b42a7ff923552f39ae

  • SHA1

    02f9750de1984188d991b1d391faf76f7cd8ed54

  • SHA256

    06042fb2e2cfd5dedfb3f2be4a12d316a2cdace1afacf669375957e1ca4fa996

  • SHA512

    3bb992d32c176b4ec1027c938dcc51b8df659b6d7aff82bf555d5f848662f1cf9456fc0b9c5ee0d3f8814f73874bd7c74e901fb30df7f8e18ddcfd7d095a13e7

  • SSDEEP

    1536:XK109VTc938trlQFPwlqhwzXSHlgq/z0eYpMMiOlyPkmk1SuWE2m:n9VTc93GloglzXijYekM1c1Sut2m

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

fkfgjfgfgg234.no-ip.biz:1177

Mutex

43ff622bd8ca58a32c991fc1ae88370d

Attributes
  • reg_key

    43ff622bd8ca58a32c991fc1ae88370d

  • splitter

    |'|'|

Targets

    • Target

      fsaaopaa.exe

    • Size

      226KB

    • MD5

      b7f58f62502a5155ac07a646870581df

    • SHA1

      a35f597849a966bbcec1f56c1aef1fa8e3482042

    • SHA256

      b75c6dd35858b8ff2b92e8c3a0f78e81187a4d2f32a13983b80cf83a714a9d9a

    • SHA512

      34b928d4aafd3bf459ac927128b5f50468fe234dd7a3dc2be55b72f4b30f8f9ae327bc35901541043418e8d492805c781c3cb64e3391a5a5bcd19c86de58a836

    • SSDEEP

      3072:Ifmk3zW4A+BzItKKUhl3J8eltXkOzzj8oUK9PfRku3pxcrt60r1qyATz:FcGMfl6OzvS6+u/Y60BhA

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks