General

  • Target

    cab394f76dc7daa2a8548a9d1bd0f699_JaffaCakes118

  • Size

    355KB

  • Sample

    241206-deyefssnhm

  • MD5

    cab394f76dc7daa2a8548a9d1bd0f699

  • SHA1

    fe4266bc4c82102e7cbae80f1d0b5ed73aa73c8c

  • SHA256

    f6d048de00d043dc334d6e6bcc558b86b00c589dcf54f0ea2b1423cd3ded25bb

  • SHA512

    e960bc345e7d9a83bf20f2e4067d72d0464e28bc07b31addc34f8f5e57eafb55b4e1a12fdf5a48d5428585f72e6cae2328c2a44ebfaa1aa6c5acb1f48cc75736

  • SSDEEP

    6144:z8JsLcpjzTDDmHayakLkrb4NSarQW82X+t40XO+5m4iU:IzxzTDWikLSb4NS7t2X+t40XO+5iU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

hackeado by ~Shadown

C2

opaeae201.zapto.org:1177

Mutex

216f293b3310c600be4683b77133b908

Attributes
  • reg_key

    216f293b3310c600be4683b77133b908

  • splitter

    |'|'|

Targets

    • Target

      cab394f76dc7daa2a8548a9d1bd0f699_JaffaCakes118

    • Size

      355KB

    • MD5

      cab394f76dc7daa2a8548a9d1bd0f699

    • SHA1

      fe4266bc4c82102e7cbae80f1d0b5ed73aa73c8c

    • SHA256

      f6d048de00d043dc334d6e6bcc558b86b00c589dcf54f0ea2b1423cd3ded25bb

    • SHA512

      e960bc345e7d9a83bf20f2e4067d72d0464e28bc07b31addc34f8f5e57eafb55b4e1a12fdf5a48d5428585f72e6cae2328c2a44ebfaa1aa6c5acb1f48cc75736

    • SSDEEP

      6144:z8JsLcpjzTDDmHayakLkrb4NSarQW82X+t40XO+5m4iU:IzxzTDWikLSb4NS7t2X+t40XO+5iU

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks