General

  • Target

    9dd417d204ae1284bd84604b69c2d166_JaffaCakes118

  • Size

    533KB

  • Sample

    241125-znb4gavrgt

  • MD5

    9dd417d204ae1284bd84604b69c2d166

  • SHA1

    9291654d54e587061cecf41513e361a3e70ae3db

  • SHA256

    0cb0967013154e7b7b77ebb1eaef5540c4c9e8d5c5cdf48470e102551fee9b50

  • SHA512

    8c898e5b0459aea7c92fb2958ad5dcb5fd244e31ebddae82e9916ce09ab16650cb9ff05603419d90c1993bf36affe6cbca00c78cfb91a54e87efa7a18fb4b045

  • SSDEEP

    12288:Autr2CcB3L0q4pcAN3QiLb8Jy4lspfblqadl5deLY:Akr69b4p7QabOLepDlb5F

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

surebox.ddns.net:5552

Mutex

96da6daf5c20026edbb7f9fbf43bfe30

96da6daf5c20026edbb7f9fbf43bfe30

Attributes
  • reg_key

    96da6daf5c20026edbb7f9fbf43bfe30

  • splitter

    |'|'|

Targets

    • Target

      9dd417d204ae1284bd84604b69c2d166_JaffaCakes118

    • Size

      533KB

    • MD5

      9dd417d204ae1284bd84604b69c2d166

    • SHA1

      9291654d54e587061cecf41513e361a3e70ae3db

    • SHA256

      0cb0967013154e7b7b77ebb1eaef5540c4c9e8d5c5cdf48470e102551fee9b50

    • SHA512

      8c898e5b0459aea7c92fb2958ad5dcb5fd244e31ebddae82e9916ce09ab16650cb9ff05603419d90c1993bf36affe6cbca00c78cfb91a54e87efa7a18fb4b045

    • SSDEEP

      12288:Autr2CcB3L0q4pcAN3QiLb8Jy4lspfblqadl5deLY:Akr69b4p7QabOLepDlb5F

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks