General

  • Target

    6eee42c08d12b60bacb58f20d0173291_JaffaCakes118

  • Size

    23KB

  • Sample

    241023-pqfvbssarj

  • MD5

    6eee42c08d12b60bacb58f20d0173291

  • SHA1

    cee1a26c81eeada1a4ec8fde0400821ef974cf20

  • SHA256

    761361dc57742e6c02418454dcc28c1185d3837f3bb2262a7977184218c1986a

  • SHA512

    935d3b040e5d29236f2a5b0ff4e57e49d512963dbb1ccf127377c46cb97046a742c1137e213fedd15f71095b8fd22e4f2702a1ff28eb0ab59f93d0385c34ec70

  • SSDEEP

    384:ZTQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZBM:ZE5yBVd7Rpcnud

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

cvm

C2

23.95.24.218:5560

Mutex

2386889187784ecc2f815f76db41d3fb

Attributes
  • reg_key

    2386889187784ecc2f815f76db41d3fb

  • splitter

    |'|'|

Targets

    • Target

      6eee42c08d12b60bacb58f20d0173291_JaffaCakes118

    • Size

      23KB

    • MD5

      6eee42c08d12b60bacb58f20d0173291

    • SHA1

      cee1a26c81eeada1a4ec8fde0400821ef974cf20

    • SHA256

      761361dc57742e6c02418454dcc28c1185d3837f3bb2262a7977184218c1986a

    • SHA512

      935d3b040e5d29236f2a5b0ff4e57e49d512963dbb1ccf127377c46cb97046a742c1137e213fedd15f71095b8fd22e4f2702a1ff28eb0ab59f93d0385c34ec70

    • SSDEEP

      384:ZTQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZBM:ZE5yBVd7Rpcnud

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks