General

  • Target

    37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118

  • Size

    501KB

  • Sample

    241012-a8r8raxhjj

  • MD5

    37a8ee92838e77cf667250cedd0cecf8

  • SHA1

    1c63553822af742ee07fb27865c51b54b74f1a27

  • SHA256

    a1912487964fbfa6a9004a0889bde004a7b3d007e98706b79688bbb6229af557

  • SHA512

    d943bcfccfa3710a6c311dfb4f13325a1fb39f77392897928e196b07d4c2209aa44e959d9b265530a7c0adfdf87db9950997d729b9811c541c2ff531f69e115c

  • SSDEEP

    6144:JdwYPCCUKFZbWo5xCQ70ThcE6f7fAwHLDjWoGhX1rvw:ZFfyEAqAp

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

imfares.ddns.net:9090

doza122.con-ip.com:5552

Mutex

21010c58298d9aa69d2fa375e98ef354

Attributes
  • reg_key

    21010c58298d9aa69d2fa375e98ef354

  • splitter

    |'|'|

Targets

    • Target

      37a8ee92838e77cf667250cedd0cecf8_JaffaCakes118

    • Size

      501KB

    • MD5

      37a8ee92838e77cf667250cedd0cecf8

    • SHA1

      1c63553822af742ee07fb27865c51b54b74f1a27

    • SHA256

      a1912487964fbfa6a9004a0889bde004a7b3d007e98706b79688bbb6229af557

    • SHA512

      d943bcfccfa3710a6c311dfb4f13325a1fb39f77392897928e196b07d4c2209aa44e959d9b265530a7c0adfdf87db9950997d729b9811c541c2ff531f69e115c

    • SSDEEP

      6144:JdwYPCCUKFZbWo5xCQ70ThcE6f7fAwHLDjWoGhX1rvw:ZFfyEAqAp

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks