General

  • Target

    7bb34676d78cf5e816d0bbb66c7c41dc_JaffaCakes118

  • Size

    550KB

  • Sample

    241029-eglzwavanf

  • MD5

    7bb34676d78cf5e816d0bbb66c7c41dc

  • SHA1

    3d636338c5b652c89d90d6f5b2abd8f42d232484

  • SHA256

    16454b7fc606c00ead3dd8f81f5ca9846bdd3207024417b88fbedff26ee8bebf

  • SHA512

    961c09e7c8cc5162e12ff5dff2ce47c28c321ec8954cc7ae678db5df4c61b91cac8f3a13c7ffe705d77009acff45e7b2f693fd95e623b7ada87ea4a75abff68d

  • SSDEEP

    12288:FRZ+IoG/n9IQxW3OBse2HkpbnOav7JHvVqH:t2G/nvxW3Wz1nOma

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

samsam23.ddns.net:1177

Mutex

ae8569b6b570262c4a55bad57ad853a5

Attributes
  • reg_key

    ae8569b6b570262c4a55bad57ad853a5

  • splitter

    |'|'|

Targets

    • Target

      7bb34676d78cf5e816d0bbb66c7c41dc_JaffaCakes118

    • Size

      550KB

    • MD5

      7bb34676d78cf5e816d0bbb66c7c41dc

    • SHA1

      3d636338c5b652c89d90d6f5b2abd8f42d232484

    • SHA256

      16454b7fc606c00ead3dd8f81f5ca9846bdd3207024417b88fbedff26ee8bebf

    • SHA512

      961c09e7c8cc5162e12ff5dff2ce47c28c321ec8954cc7ae678db5df4c61b91cac8f3a13c7ffe705d77009acff45e7b2f693fd95e623b7ada87ea4a75abff68d

    • SSDEEP

      12288:FRZ+IoG/n9IQxW3OBse2HkpbnOav7JHvVqH:t2G/nvxW3Wz1nOma

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks