General

  • Target

    8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118

  • Size

    27KB

  • Sample

    241030-zlk9cs1cqd

  • MD5

    8053e8d64be8f8296c3dbd269c0aba41

  • SHA1

    f7063edbe53d30fef2b228b3fe15a243cd39e358

  • SHA256

    8667fa7a0ac2e78989cc8e886ad752cc26cf6da40ecb951a102cce3577656894

  • SHA512

    bae7676616dcd55db5a032ce93d6b7a809994454e25b0de0d854ef4685b3e540799bdfefc9c93175d90fcd89ae52530cb85b9d9b0ebf609f1b309b06ef4f05aa

  • SSDEEP

    384:QLRQKJ3buZjmgERA40DwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcaJ:O2K5buQE40fLFA/vMHTi9bD

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

185.195.232.248:54977

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118

    • Size

      27KB

    • MD5

      8053e8d64be8f8296c3dbd269c0aba41

    • SHA1

      f7063edbe53d30fef2b228b3fe15a243cd39e358

    • SHA256

      8667fa7a0ac2e78989cc8e886ad752cc26cf6da40ecb951a102cce3577656894

    • SHA512

      bae7676616dcd55db5a032ce93d6b7a809994454e25b0de0d854ef4685b3e540799bdfefc9c93175d90fcd89ae52530cb85b9d9b0ebf609f1b309b06ef4f05aa

    • SSDEEP

      384:QLRQKJ3buZjmgERA40DwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcaJ:O2K5buQE40fLFA/vMHTi9bD

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks