General

  • Target

    1ed26a4e67e250c66e2f80199c5cf289_JaffaCakes118

  • Size

    560KB

  • Sample

    241008-bq89zswbmd

  • MD5

    1ed26a4e67e250c66e2f80199c5cf289

  • SHA1

    2200eaab52d0401a8a3681c55790ce5b720420f9

  • SHA256

    7e7ded78b7fc6d533580cedeb16a9f003cee552ddf0acebaf883fb17a9eabb69

  • SHA512

    82ed59e438e989643d841c779e0aaceded6127e906bdc7f00e51297aeff0bd5807399ebe1a6bcd8f1e8c124c168d7c27fa180a67f7e30d644c1394448938ac0d

  • SSDEEP

    12288:PeDCXFXoyf7j20GeZCLHK63ZEgZBQTDW/e2zrXoybvDc0G+gROs7MyfVhKd:P4C1XfGeZypxBQTSm2fXdGH45y6d

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HOME

C2

popintertradeer.ddns.net:5552

Mutex

8142474e71bf5da2c38d35d26869bf5c

8142474e71bf5da2c38d35d26869bf5c

Attributes
  • reg_key

    8142474e71bf5da2c38d35d26869bf5c

  • splitter

    |'|'|

Targets

    • Target

      Wire Notification.jar

    • Size

      560KB

    • MD5

      22b2dd04bb82b6fb05f6d148255c14c6

    • SHA1

      782faf733ea7d5e36f5e77dd66a7e16fa2f7f86d

    • SHA256

      dd33019c84b905443de022d1ff40146e7d1a2b5b472a3e1589b0ecb36ee64555

    • SHA512

      295eed7bd9cc01f499896f53cc764836fc04513e79434e9b1365bae7105f4ef09cbb668224d9a1653d945a8d7d190693f182cc40307a0a92dec2e916dd7c82c7

    • SSDEEP

      12288:k9f0DrXoyn7Dg0G4ZCLrK6PxEgZ7QBjm/i01rXoyNpDC0GUaResHMO:k50PXtG4ZQpx7QBCa0pXbGdMnO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks