General

  • Target

    JaffaCakes118_89aa5a0fda1879c30aa8dbe78a653f3e

  • Size

    168KB

  • Sample

    250105-eejfzasqhn

  • MD5

    89aa5a0fda1879c30aa8dbe78a653f3e

  • SHA1

    079e11025da691bf774aae682d949601edefb363

  • SHA256

    29c45a046d058cb7417e88bd109541046a2cba16c48c1bfc285d64e02822140d

  • SHA512

    f9fcaad2f544b56601cea90cca0203acfb8593a884edf55877a85202228b0f0061fbb26e13f96476f6e4f9aaa8a88dccf2fcee0f2f96de7a959792f5e382fbcf

  • SSDEEP

    3072:kT/WaQrJW7KeX8GzEdkidNIxTdllPCWb6SuL5Hg8Jti8vWqitwLHvwFLOUp:kzWaQrJWKeX8iDid6TdUHnnv8

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

4월7일

C2

guswns740.codns.com:5552

Mutex

d2abe5e9117deeb4eae4472e2992b74e

Attributes
  • reg_key

    d2abe5e9117deeb4eae4472e2992b74e

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_89aa5a0fda1879c30aa8dbe78a653f3e

    • Size

      168KB

    • MD5

      89aa5a0fda1879c30aa8dbe78a653f3e

    • SHA1

      079e11025da691bf774aae682d949601edefb363

    • SHA256

      29c45a046d058cb7417e88bd109541046a2cba16c48c1bfc285d64e02822140d

    • SHA512

      f9fcaad2f544b56601cea90cca0203acfb8593a884edf55877a85202228b0f0061fbb26e13f96476f6e4f9aaa8a88dccf2fcee0f2f96de7a959792f5e382fbcf

    • SSDEEP

      3072:kT/WaQrJW7KeX8GzEdkidNIxTdllPCWb6SuL5Hg8Jti8vWqitwLHvwFLOUp:kzWaQrJWKeX8iDid6TdUHnnv8

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks