General

  • Target

    a726cf1b97f05f38e57b419e6b743fbb_JaffaCakes118

  • Size

    457KB

  • Sample

    241127-lhbzmaxqcw

  • MD5

    a726cf1b97f05f38e57b419e6b743fbb

  • SHA1

    5239037658fd854543ceb113d5170441a192e8c8

  • SHA256

    497917e66636a7e15f7d07ea717830df76eec91da45643b0a9ce8ec957cf100f

  • SHA512

    1420758890c91cbdb8e73eca6550e98746890f5f70e2c5da88083b27d84c890bcd5da2d9344b59c4593ac2e9d6a7c2b0113f83f20508137c1e38b7244aa8a2cd

  • SSDEEP

    6144:HjT5Zh17eWxoG/+ov/2OIQ4wW3OBsCeAWoj2fAbzN6nav72C1jFTkZ:HRZ+IoG/n9IQxW3OBseBwAbzuav7JH4

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

samsam23.ddns.net:1177

Mutex

ae8569b6b570262c4a55bad57ad853a5

Attributes
  • reg_key

    ae8569b6b570262c4a55bad57ad853a5

  • splitter

    |'|'|

Targets

    • Target

      a726cf1b97f05f38e57b419e6b743fbb_JaffaCakes118

    • Size

      457KB

    • MD5

      a726cf1b97f05f38e57b419e6b743fbb

    • SHA1

      5239037658fd854543ceb113d5170441a192e8c8

    • SHA256

      497917e66636a7e15f7d07ea717830df76eec91da45643b0a9ce8ec957cf100f

    • SHA512

      1420758890c91cbdb8e73eca6550e98746890f5f70e2c5da88083b27d84c890bcd5da2d9344b59c4593ac2e9d6a7c2b0113f83f20508137c1e38b7244aa8a2cd

    • SSDEEP

      6144:HjT5Zh17eWxoG/+ov/2OIQ4wW3OBsCeAWoj2fAbzN6nav72C1jFTkZ:HRZ+IoG/n9IQxW3OBseBwAbzuav7JH4

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks