General

  • Target

    8e15f4de5d88adf804b9f6d99867e802_JaffaCakes118

  • Size

    177KB

  • Sample

    241103-3rrvwaxja1

  • MD5

    8e15f4de5d88adf804b9f6d99867e802

  • SHA1

    b72e4ad25e9810b519e0405be55b117fb59bb7ca

  • SHA256

    7e8890718f9870330da3f41b7ba683672eec490658616bbe85c40272d0cb61d6

  • SHA512

    6791aa5f9f7a8ace78e8734a6f467d57431cc728b10fd28d017e45bb0c4428a405033170ca6488f4ecd0df04a349ecdbbe99f8ae398e790ce496b1a550712ead

  • SSDEEP

    3072:aM+6nzVx1VuhG+RNbLw9zFj18WVUU0i/GfXXPKpoLNdvrxN72NBk8xcvTQvUfZVP:Z+6Rx1VM5LipjPz0iyXXPKpydzf2NBk7

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

sina132.no-ip.biz:5552

Mutex

657fce770b32d2b3a4cf7623dcfe841f

Attributes
  • reg_key

    657fce770b32d2b3a4cf7623dcfe841f

  • splitter

    |'|'|

Targets

    • Target

      Apb.exe

    • Size

      317KB

    • MD5

      34ba426af267b9963cd5e8766b733472

    • SHA1

      abf47a7cd5c5e16ff14592320e2f74d0ac1f06c4

    • SHA256

      789e97a5c99efcbcb3cad73b0ed7e69eb7dfa525b1c098b6e47f607823cefecb

    • SHA512

      3d1a9fd15593801d1b678036a49394e608fb30e4bb6405f3a6ef972652d22cd9d4132c7ad0140d38ef8895fc5d66d13f42e972cab9ffc629237ce193a312a455

    • SSDEEP

      6144:jPgG6aJGObkpAvjnQsmYGoygDBa4RFCpO:jPgG6KGOiAzFzG0DBQI

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks