General

  • Target

    ebab6e91a1736416e97bca4b8ddd87a5_JaffaCakes118

  • Size

    230KB

  • Sample

    241213-qgkbts1mfp

  • MD5

    ebab6e91a1736416e97bca4b8ddd87a5

  • SHA1

    b4dc69e71ebcaa95d3bbf89e0e74d6820ccecbb6

  • SHA256

    7d72cb7530ede090d17e4907b71cb92f3e1753c1ee3be4b2e53a3308acde1726

  • SHA512

    4a0c86e5e9c668668a3a58dd87a825842a4e75be83509811d000678bfc4b4b84a2fce91e9385ba9574d2e1dea1f082d036c0d19da604e720033b542cb6470d29

  • SSDEEP

    3072:w5rSi9mLPT63Q77NhQGMHphGw+EIsxw8baRYX2NCancRu7AlSfZEPCNHLI8rMbAL:UrSi9cPCQ7JTMJvjAMbAx9z

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hidraforce1.ddns.net:1177

Mutex

4656057f4014916bfb1410eced2985c4

Attributes
  • reg_key

    4656057f4014916bfb1410eced2985c4

  • splitter

    |'|'|

Targets

    • Target

      ebab6e91a1736416e97bca4b8ddd87a5_JaffaCakes118

    • Size

      230KB

    • MD5

      ebab6e91a1736416e97bca4b8ddd87a5

    • SHA1

      b4dc69e71ebcaa95d3bbf89e0e74d6820ccecbb6

    • SHA256

      7d72cb7530ede090d17e4907b71cb92f3e1753c1ee3be4b2e53a3308acde1726

    • SHA512

      4a0c86e5e9c668668a3a58dd87a825842a4e75be83509811d000678bfc4b4b84a2fce91e9385ba9574d2e1dea1f082d036c0d19da604e720033b542cb6470d29

    • SSDEEP

      3072:w5rSi9mLPT63Q77NhQGMHphGw+EIsxw8baRYX2NCancRu7AlSfZEPCNHLI8rMbAL:UrSi9cPCQ7JTMJvjAMbAx9z

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks