General

  • Target

    fe1fdad891d9d70a8882ca84bdceabaf_JaffaCakes118

  • Size

    277KB

  • Sample

    241219-c779pavkgj

  • MD5

    fe1fdad891d9d70a8882ca84bdceabaf

  • SHA1

    bfd898b76e34089f0cee400359270deaca422baf

  • SHA256

    4af3224e9388eb0635cf76ffbfb70604f6271c90d04fa66a83e788a1ebe2bc4a

  • SHA512

    1af84eb316dd5fed69ad478d19805cd9c835cffd248defe708895d70e787f461487220d710e9ee484ec041503cd2fd81768039888f931158680e8cec457a01d5

  • SSDEEP

    6144:JnfoQD+lWXKTrd4wLyHliPMorD29Y2iO+Ai0bgJ3QIkX/l:pXjKTrdS/2WY2hV/bgVjkX/

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

malekbb.no-ip.biz:1177

Mutex

62c91990ef3b28ae63840fc9e70ab61b

Attributes
  • reg_key

    62c91990ef3b28ae63840fc9e70ab61b

  • splitter

    |'|'|

Targets

    • Target

      fe1fdad891d9d70a8882ca84bdceabaf_JaffaCakes118

    • Size

      277KB

    • MD5

      fe1fdad891d9d70a8882ca84bdceabaf

    • SHA1

      bfd898b76e34089f0cee400359270deaca422baf

    • SHA256

      4af3224e9388eb0635cf76ffbfb70604f6271c90d04fa66a83e788a1ebe2bc4a

    • SHA512

      1af84eb316dd5fed69ad478d19805cd9c835cffd248defe708895d70e787f461487220d710e9ee484ec041503cd2fd81768039888f931158680e8cec457a01d5

    • SSDEEP

      6144:JnfoQD+lWXKTrd4wLyHliPMorD29Y2iO+Ai0bgJ3QIkX/l:pXjKTrdS/2WY2hV/bgVjkX/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks