General

  • Target

    e4c7fcfe971327022a38210689982333_JaffaCakes118

  • Size

    385KB

  • Sample

    241212-fjdxqa1nfz

  • MD5

    e4c7fcfe971327022a38210689982333

  • SHA1

    6a8ee0ab1a346744f03de0c0c4e3ec5405c86ccc

  • SHA256

    47b1e0d6288e6e4f91c8c998e7ed19f51bd94b34028867503fa86fcbc149e378

  • SHA512

    cfc83c794d91ea3b4eae6272c0ed4f2bb0d49f62ab2c299473c3d1888d18edf86e498864b6ac242877f7759751e3aa2d7e45b92ef26ac341f67c8ee9e8623466

  • SSDEEP

    12288:PMMMMMMMMMMMMMMMrMMMMMMMMMMMMMMMMXnTppc6o7MMMMMMMMMMMMMMVGX3jaAt:PMMMMMMMMMMMMMMMrMMMMMMMMMMMMMM5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

10.0.2.15:1177

Mutex

b5edc749cb8144fc0676a96be1a99c50

Attributes
  • reg_key

    b5edc749cb8144fc0676a96be1a99c50

  • splitter

    |'|'|

Targets

    • Target

      e4c7fcfe971327022a38210689982333_JaffaCakes118

    • Size

      385KB

    • MD5

      e4c7fcfe971327022a38210689982333

    • SHA1

      6a8ee0ab1a346744f03de0c0c4e3ec5405c86ccc

    • SHA256

      47b1e0d6288e6e4f91c8c998e7ed19f51bd94b34028867503fa86fcbc149e378

    • SHA512

      cfc83c794d91ea3b4eae6272c0ed4f2bb0d49f62ab2c299473c3d1888d18edf86e498864b6ac242877f7759751e3aa2d7e45b92ef26ac341f67c8ee9e8623466

    • SSDEEP

      12288:PMMMMMMMMMMMMMMMrMMMMMMMMMMMMMMMMXnTppc6o7MMMMMMMMMMMMMMVGX3jaAt:PMMMMMMMMMMMMMMMrMMMMMMMMMMMMMM5

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks