General

  • Target

    e0cb4a0a9b47a1df65022ecf3ad0d212_JaffaCakes118

  • Size

    219KB

  • Sample

    241211-lbkceswpb1

  • MD5

    e0cb4a0a9b47a1df65022ecf3ad0d212

  • SHA1

    71a838257ed69355500cc22b78e735ef64874095

  • SHA256

    cdb2a4aff97a6b474084374db339c8528f50c3eeb697ed187352dee81316bd59

  • SHA512

    419b8c3f2789ffa3f49db97c06354743f76ff51d4d17a18ed2a01d26a3bbf427c616e81caeff00efe58585cd2e6b029208170aedaf80af48480e7ee058c3573c

  • SSDEEP

    3072:YRSEC2Oi8NXC797F8TBfFvj4bq57ZWl4dtpataXMMx+kkQ3q:YrC2F8NXC796TB9vj48ol8DaaXLx+k3

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

idris hajyawa

C2

karzanwww.no-ip.biz:1177

Mutex

23c179e39668ac725f304f64296daad7

Attributes
  • reg_key

    23c179e39668ac725f304f64296daad7

  • splitter

    |'|'|

Targets

    • Target

      e0cb4a0a9b47a1df65022ecf3ad0d212_JaffaCakes118

    • Size

      219KB

    • MD5

      e0cb4a0a9b47a1df65022ecf3ad0d212

    • SHA1

      71a838257ed69355500cc22b78e735ef64874095

    • SHA256

      cdb2a4aff97a6b474084374db339c8528f50c3eeb697ed187352dee81316bd59

    • SHA512

      419b8c3f2789ffa3f49db97c06354743f76ff51d4d17a18ed2a01d26a3bbf427c616e81caeff00efe58585cd2e6b029208170aedaf80af48480e7ee058c3573c

    • SSDEEP

      3072:YRSEC2Oi8NXC797F8TBfFvj4bq57ZWl4dtpataXMMx+kkQ3q:YrC2F8NXC796TB9vj48ol8DaaXLx+k3

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks