General

  • Target

    be307e28ed51dc3f12b48ec4bfdc7058_JaffaCakes118

  • Size

    23KB

  • Sample

    241203-tm9qfssnez

  • MD5

    be307e28ed51dc3f12b48ec4bfdc7058

  • SHA1

    e0104cfb9e4b3b7ca1b4bffe73a212e2c1991322

  • SHA256

    d28967d1defe22df2a66eb71b1114042edad36276541f0fb1581b5e7dca3d3e1

  • SHA512

    6ad70f1c2937aae2e25ef9cb2eabc40fecb5d285f93fdaddab7035f28eb82fbbb547ec847d17a18872ebb2cc67387972dbc9ea816fe2df108f812b8c59f49a54

  • SSDEEP

    384:zMKyOkBkRbohza8yuTUt7u06zgV4a5pzomRvR6JZlbw8hqIusZzZoO:o/YI1T0Rpcnu0

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

sv

C2

cancer44.ddns.net:1177

Mutex

864b2ff41d0495f4660dbfa3809555a0

Attributes
  • reg_key

    864b2ff41d0495f4660dbfa3809555a0

  • splitter

    |'|'|

Targets

    • Target

      be307e28ed51dc3f12b48ec4bfdc7058_JaffaCakes118

    • Size

      23KB

    • MD5

      be307e28ed51dc3f12b48ec4bfdc7058

    • SHA1

      e0104cfb9e4b3b7ca1b4bffe73a212e2c1991322

    • SHA256

      d28967d1defe22df2a66eb71b1114042edad36276541f0fb1581b5e7dca3d3e1

    • SHA512

      6ad70f1c2937aae2e25ef9cb2eabc40fecb5d285f93fdaddab7035f28eb82fbbb547ec847d17a18872ebb2cc67387972dbc9ea816fe2df108f812b8c59f49a54

    • SSDEEP

      384:zMKyOkBkRbohza8yuTUt7u06zgV4a5pzomRvR6JZlbw8hqIusZzZoO:o/YI1T0Rpcnu0

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks