General

  • Target

    4ba5fed877aaf558a5235989262bf1ee_JaffaCakes118

  • Size

    450KB

  • Sample

    240331-dq2k9acg5v

  • MD5

    4ba5fed877aaf558a5235989262bf1ee

  • SHA1

    bb0c3c3338866caa38ea12f41c16c3f5f162a2d4

  • SHA256

    5d1268768233cb4861b2a7bdaba1f3f646b6e18efadcb84f25c160ff79860972

  • SHA512

    a93c7213eee99ed494e6c51959b299f7caac18878eec9d7ac34921a15254e9bfd8a497df37fc5475d07d875d465d82da02fe1b58ae6246fa63e24acc4afa84b8

  • SSDEEP

    12288:PEYG7ywzVxKHZFRupFRulhx+vhx+Shx+whx+G:TuduwmBDG

Malware Config

Extracted

Family

njrat

Version

v4.0

Botnet

Quran

C2

165.227.31.192:22867

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      4ba5fed877aaf558a5235989262bf1ee_JaffaCakes118

    • Size

      450KB

    • MD5

      4ba5fed877aaf558a5235989262bf1ee

    • SHA1

      bb0c3c3338866caa38ea12f41c16c3f5f162a2d4

    • SHA256

      5d1268768233cb4861b2a7bdaba1f3f646b6e18efadcb84f25c160ff79860972

    • SHA512

      a93c7213eee99ed494e6c51959b299f7caac18878eec9d7ac34921a15254e9bfd8a497df37fc5475d07d875d465d82da02fe1b58ae6246fa63e24acc4afa84b8

    • SSDEEP

      12288:PEYG7ywzVxKHZFRupFRulhx+vhx+Shx+whx+G:TuduwmBDG

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks