General

  • Target

    ce36de4c05449367040a4d0acd654e2c_JaffaCakes118

  • Size

    71KB

  • Sample

    241206-v5gytsvkdm

  • MD5

    ce36de4c05449367040a4d0acd654e2c

  • SHA1

    969fd2ee240e92cf3e276d9aa9b522a3e6a6ca9c

  • SHA256

    d003f94aca83e61adc266160682c4220a7c61947d0cf43d85bcad84dd37afa7c

  • SHA512

    4022fab2faa3a431245c79ad27ab0387e41e9196e877f185e7477bdf3f56b7c51242646da4d7e343a21a1d57dec6f85500e254955283aee2562de280ac4aee25

  • SSDEEP

    1536:cnqataQKbBthkLL69E2kszV8WUhIankpU5jxZgN/EOuNHdn2G/G:zataNbBIL6q2NV66n0sN8NHa

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ghost11.ddns.net:5552

Mutex

b61ae7996480d4a7310c3a469e022932

Attributes
  • reg_key

    b61ae7996480d4a7310c3a469e022932

  • splitter

    |'|'|

Targets

    • Target

      ce36de4c05449367040a4d0acd654e2c_JaffaCakes118

    • Size

      71KB

    • MD5

      ce36de4c05449367040a4d0acd654e2c

    • SHA1

      969fd2ee240e92cf3e276d9aa9b522a3e6a6ca9c

    • SHA256

      d003f94aca83e61adc266160682c4220a7c61947d0cf43d85bcad84dd37afa7c

    • SHA512

      4022fab2faa3a431245c79ad27ab0387e41e9196e877f185e7477bdf3f56b7c51242646da4d7e343a21a1d57dec6f85500e254955283aee2562de280ac4aee25

    • SSDEEP

      1536:cnqataQKbBthkLL69E2kszV8WUhIankpU5jxZgN/EOuNHdn2G/G:zataNbBIL6q2NV66n0sN8NHa

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks