General

  • Target

    JaffaCakes118_3cca3317e716b30530103dd063737a1e

  • Size

    68KB

  • Sample

    241231-2yq2gstnct

  • MD5

    3cca3317e716b30530103dd063737a1e

  • SHA1

    bbcd083dc5c8d7fdf52f56e0464d99080f8ad89a

  • SHA256

    425484879bc522311f58d73856dd35540920ca18f95468a7d4fb2dec664e92fe

  • SHA512

    267b991fa60b89218e9c3094f1a82d962f9de4fa16aa2db438bb47ef104ddd36638fe674bf9350912e90b0d1d6b3764d05000ccd638084b243a772db71945521

  • SSDEEP

    768:NOE4DGJI10loASkuZds66b1DQNq+tsPUy7A46LSPY/Hc/6lIBywSv:UlDX10lnSjds66ZD5+toT6LScK6lIc

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

23f0e3bce589df29a3e6f3e8879b41c1

Attributes
  • reg_key

    23f0e3bce589df29a3e6f3e8879b41c1

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_3cca3317e716b30530103dd063737a1e

    • Size

      68KB

    • MD5

      3cca3317e716b30530103dd063737a1e

    • SHA1

      bbcd083dc5c8d7fdf52f56e0464d99080f8ad89a

    • SHA256

      425484879bc522311f58d73856dd35540920ca18f95468a7d4fb2dec664e92fe

    • SHA512

      267b991fa60b89218e9c3094f1a82d962f9de4fa16aa2db438bb47ef104ddd36638fe674bf9350912e90b0d1d6b3764d05000ccd638084b243a772db71945521

    • SSDEEP

      768:NOE4DGJI10loASkuZds66b1DQNq+tsPUy7A46LSPY/Hc/6lIBywSv:UlDX10lnSjds66ZD5+toT6LScK6lIc

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks