General

  • Target

    6077bb7801e112f11662f0a6fbd2f259_JaffaCakes118

  • Size

    347KB

  • Sample

    241020-fk3x8szgjd

  • MD5

    6077bb7801e112f11662f0a6fbd2f259

  • SHA1

    7f2f158d1df1009b0a76b439d506b22bdd7ee5fd

  • SHA256

    5f69a1bb4c4a4d1b7a1fc985461ae8c3ca368c8eaede244c573c0f54eccc0c78

  • SHA512

    06ef1b3873909aed5310bfe579f2064b42a160efc7ce9cb1dbe75ccff38b53a070bcb22e3c380a3c32a00d8753f5e14d984f854e1ecd00dd060547a23290c7ee

  • SSDEEP

    6144:aQ6CCRvH5w9uLsNDt6v1nFqErfMVlEt/RDQCOgKJuk:2RfTLsND6vqErxt/5VOHu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      6077bb7801e112f11662f0a6fbd2f259_JaffaCakes118

    • Size

      347KB

    • MD5

      6077bb7801e112f11662f0a6fbd2f259

    • SHA1

      7f2f158d1df1009b0a76b439d506b22bdd7ee5fd

    • SHA256

      5f69a1bb4c4a4d1b7a1fc985461ae8c3ca368c8eaede244c573c0f54eccc0c78

    • SHA512

      06ef1b3873909aed5310bfe579f2064b42a160efc7ce9cb1dbe75ccff38b53a070bcb22e3c380a3c32a00d8753f5e14d984f854e1ecd00dd060547a23290c7ee

    • SSDEEP

      6144:aQ6CCRvH5w9uLsNDt6v1nFqErfMVlEt/RDQCOgKJuk:2RfTLsND6vqErxt/5VOHu

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks