General

  • Target

    JaffaCakes118_0755202989af7b02854d037555d59960

  • Size

    533KB

  • Sample

    241231-ghe9tsxmej

  • MD5

    0755202989af7b02854d037555d59960

  • SHA1

    0c04c481210173061a4782445b1c4200dc99b5cb

  • SHA256

    0db2a4a3858e08b50d1bfe9ea64f1d8942e0e25b5a724e5d191d9a259ce92a97

  • SHA512

    bce9a57732013c1726f3bf164d7d994d45964efb47a14fc336893489835a08f272e8b15fdbe5d0e6e4090835088c1f60c8891e31e17bdcfb169c30386fa95df0

  • SSDEEP

    12288:bLRlwpF8wqQWWCRmMdR5fsJvPyLgUdGPbzYMWzY:tjPcUgrq

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

fa9f4d3bb78605f48188ec5cde46d507

Attributes
  • reg_key

    fa9f4d3bb78605f48188ec5cde46d507

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_0755202989af7b02854d037555d59960

    • Size

      533KB

    • MD5

      0755202989af7b02854d037555d59960

    • SHA1

      0c04c481210173061a4782445b1c4200dc99b5cb

    • SHA256

      0db2a4a3858e08b50d1bfe9ea64f1d8942e0e25b5a724e5d191d9a259ce92a97

    • SHA512

      bce9a57732013c1726f3bf164d7d994d45964efb47a14fc336893489835a08f272e8b15fdbe5d0e6e4090835088c1f60c8891e31e17bdcfb169c30386fa95df0

    • SSDEEP

      12288:bLRlwpF8wqQWWCRmMdR5fsJvPyLgUdGPbzYMWzY:tjPcUgrq

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks