General

  • Target

    JaffaCakes118_b68bfc79f67b93e3db137eb63f31071e

  • Size

    37KB

  • Sample

    250105-w3hysatrdn

  • MD5

    b68bfc79f67b93e3db137eb63f31071e

  • SHA1

    e6252d84c7135bd5749529cb1f412aa2768a6203

  • SHA256

    e890608a4cc37e0c648574caa821053c427732ba0afc2eaf432b635709d0d791

  • SHA512

    8990b22c7e23db28d9217f7be96cad890bbd0ad1b32ae98e4b5810c2ad7ae84df46c124423b0cc9d6c92436fbd424e5b3b2444d2275a3b1f5b3059ce90b16ebc

  • SSDEEP

    384:sk7pyEithPJWtckUy8fFMfPke9PEJYrAF+rMRTyN/0L+EcoinblneHQM3epzXQN5:T+zkX8fFME4EurM+rMRa8NuCBt

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

185.11.83.58:8080

Mutex

42884113853c24691f6976d8ae78b82d

Attributes
  • reg_key

    42884113853c24691f6976d8ae78b82d

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_b68bfc79f67b93e3db137eb63f31071e

    • Size

      37KB

    • MD5

      b68bfc79f67b93e3db137eb63f31071e

    • SHA1

      e6252d84c7135bd5749529cb1f412aa2768a6203

    • SHA256

      e890608a4cc37e0c648574caa821053c427732ba0afc2eaf432b635709d0d791

    • SHA512

      8990b22c7e23db28d9217f7be96cad890bbd0ad1b32ae98e4b5810c2ad7ae84df46c124423b0cc9d6c92436fbd424e5b3b2444d2275a3b1f5b3059ce90b16ebc

    • SSDEEP

      384:sk7pyEithPJWtckUy8fFMfPke9PEJYrAF+rMRTyN/0L+EcoinblneHQM3epzXQN5:T+zkX8fFME4EurM+rMRa8NuCBt

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks