General

  • Target

    6eb77d43ab30618dc1c85d0423b7a610_JaffaCakes118

  • Size

    366KB

  • Sample

    240524-q1majagb62

  • MD5

    6eb77d43ab30618dc1c85d0423b7a610

  • SHA1

    f5f139d04d0b8a8bd68d879794e07010ffd61ed8

  • SHA256

    40c4138d29d4248af3d6489ec3d01b999c1efce936443937c6801abd1a9ad166

  • SHA512

    83fb078958bc5ff4f219e116df6049516a9ba2e7af0b8d5da5d2f9f25f3728b3812db1c2f50c0b7ba5705366f502d1f3f47d477337f70126a4dc2a7ca96de91b

  • SSDEEP

    6144:VS2Ncif96RpMpUubgLXtfjE8rgMP7noYxk4aNOti6t60PoQOMuNXGygxcWjN1I:VSQN9TpUrBdzDpLtNPoQOIyg2QNW

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SpreadByKayxs

C2

paravant.no-ip.org:6600

Mutex

903b5e476b60431f6f04947fbe52bcc3

Attributes
  • reg_key

    903b5e476b60431f6f04947fbe52bcc3

  • splitter

    |'|'|

Targets

    • Target

      LOLPro/LOL PRO 5.2.exe

    • Size

      966KB

    • MD5

      f6ef181ef99d83e9abd6e4a31066779c

    • SHA1

      910734741be798fa7028e56589eaa63f650fbea7

    • SHA256

      d5f9071bdf3777ec1c2156ef56e2404ffa107bea1ee1abdfcf324437f27a205c

    • SHA512

      aef121cd8e9d0d5292c9a0952b2b4fda4c5d8d8208eee1ab854d4fff167bb29d7e98afa49109ab8d56d4dacd1d4058c414784337d90cbeae938ee49df1f69c53

    • SSDEEP

      24576:54lavt0LkLL9IMixoEgeadFMdWxIq9MmCS:Ikwkn9IMHead+daPCS

    • Modifies visiblity of hidden/system files in Explorer

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks