General

  • Target

    75e5c506a2b0d241e27f360ec181eb6c_JaffaCakes118

  • Size

    182KB

  • Sample

    241025-dc91gatfjl

  • MD5

    75e5c506a2b0d241e27f360ec181eb6c

  • SHA1

    ba601a2538bb11f6cc80f18e7028f7e01b78a0a2

  • SHA256

    33cfd9e43dcb58881a858aa12779b69a63fe45bfd80e355df9728e23ffce264b

  • SHA512

    c31429b096762173c92409fc25bb7c18e7ddfd98a55afadd2ab596865563e2705a48982c3d546ebe1d97858509cdd761dc232dc3fa0981d270e4ae2320401e03

  • SSDEEP

    1536:UXMbDN0MM5YbMIboDpUYw3weJEqeVGaqsSKvKqkSZZZ3gNxib:qMbJM5rHdvUURb

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

fadlfreh.hopto.org:3973

Mutex

2e36917ee12f744b21767673c17c8221

Attributes
  • reg_key

    2e36917ee12f744b21767673c17c8221

  • splitter

    |'|'|

Targets

    • Target

      75e5c506a2b0d241e27f360ec181eb6c_JaffaCakes118

    • Size

      182KB

    • MD5

      75e5c506a2b0d241e27f360ec181eb6c

    • SHA1

      ba601a2538bb11f6cc80f18e7028f7e01b78a0a2

    • SHA256

      33cfd9e43dcb58881a858aa12779b69a63fe45bfd80e355df9728e23ffce264b

    • SHA512

      c31429b096762173c92409fc25bb7c18e7ddfd98a55afadd2ab596865563e2705a48982c3d546ebe1d97858509cdd761dc232dc3fa0981d270e4ae2320401e03

    • SSDEEP

      1536:UXMbDN0MM5YbMIboDpUYw3weJEqeVGaqsSKvKqkSZZZ3gNxib:qMbJM5rHdvUURb

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks