General

  • Target

    JaffaCakes118_3d5d5001a558f06c8013f35d0708817c

  • Size

    100KB

  • Sample

    241231-25tqyswrcl

  • MD5

    3d5d5001a558f06c8013f35d0708817c

  • SHA1

    41642aec0b7ea7010c71ed512e952de75745112b

  • SHA256

    bc39b35fe49d2d8ffbfdbeb9f99c138919b2dc8acbfa8ee089c959b1270f1239

  • SHA512

    a69346e463a6bee2ac84b6596d3faa74d3d527c53a52759d61c5a80bead05ae8a4fd49533807e54ffa518c09ca8937424ceb6604797225de35133ab3f2fd6724

  • SSDEEP

    1536:WAp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4eP:d5eznsjsguGDFqG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

neuf

C2

doddyfire.linkpc.net:10000

Mutex

e1a87040f2026369a233f9ae76301b7b

Attributes
  • reg_key

    e1a87040f2026369a233f9ae76301b7b

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_3d5d5001a558f06c8013f35d0708817c

    • Size

      100KB

    • MD5

      3d5d5001a558f06c8013f35d0708817c

    • SHA1

      41642aec0b7ea7010c71ed512e952de75745112b

    • SHA256

      bc39b35fe49d2d8ffbfdbeb9f99c138919b2dc8acbfa8ee089c959b1270f1239

    • SHA512

      a69346e463a6bee2ac84b6596d3faa74d3d527c53a52759d61c5a80bead05ae8a4fd49533807e54ffa518c09ca8937424ceb6604797225de35133ab3f2fd6724

    • SSDEEP

      1536:WAp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4eP:d5eznsjsguGDFqG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks