General

  • Target

    c06aa970bd19848b1e30d7ef29b96db9_JaffaCakes118

  • Size

    118KB

  • Sample

    241204-c3v4kasqaq

  • MD5

    c06aa970bd19848b1e30d7ef29b96db9

  • SHA1

    d00136054593fd2866a708ab0747a906a9329ddc

  • SHA256

    a6f6e5c3c97c144017680125611d208180a11cbede998b814eccc003d19958c9

  • SHA512

    e89b997a3c3c2209b27413a4d91e8e85832bfb8b0a5732194d92f6e7f0d3b17c2b3835bc00d54d2851ecaaee7c6dceb09c6263bdeba9f8865f775ab341afe655

  • SSDEEP

    1536:u7f65g9OX2CLGAApICdOk/dYLAZXdlItBGTjeIOlnToIfqwqHTTarAW9ctzqmg1I:knlVICUkLrGGTINTBfqHHYcFqmaI

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:666

Mutex

d95e2235c32e093b2431125ea5df9722

Attributes
  • reg_key

    d95e2235c32e093b2431125ea5df9722

  • splitter

    |'|'|

Targets

    • Target

      c06aa970bd19848b1e30d7ef29b96db9_JaffaCakes118

    • Size

      118KB

    • MD5

      c06aa970bd19848b1e30d7ef29b96db9

    • SHA1

      d00136054593fd2866a708ab0747a906a9329ddc

    • SHA256

      a6f6e5c3c97c144017680125611d208180a11cbede998b814eccc003d19958c9

    • SHA512

      e89b997a3c3c2209b27413a4d91e8e85832bfb8b0a5732194d92f6e7f0d3b17c2b3835bc00d54d2851ecaaee7c6dceb09c6263bdeba9f8865f775ab341afe655

    • SSDEEP

      1536:u7f65g9OX2CLGAApICdOk/dYLAZXdlItBGTjeIOlnToIfqwqHTTarAW9ctzqmg1I:knlVICUkLrGGTINTBfqHHYcFqmaI

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks