General

  • Target

    JaffaCakes118_1249a130226433cade7ba31890f6f37c

  • Size

    268KB

  • Sample

    241231-lp9jgavkez

  • MD5

    1249a130226433cade7ba31890f6f37c

  • SHA1

    4012785a1ae0cf850f879f07744431a73edc1560

  • SHA256

    aee4566c0079232220d05027859303ac5f76a6db6a1ee2ee8946f68bc9ac889d

  • SHA512

    ca649cbfc7f10d47b56d2f53c8bc52fce92bb1705c0be5f91205448b683e332863acec8cc48d0581ad9f19ec774fb4c8b23a16a42ae3fa853b5db34b4167c8bb

  • SSDEEP

    3072:U2ejuzN8baRYX2NCanoHXoJyWs12WD9Erugvntaxw9:Tej4EF4uRxw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

anonymous1999.hopto.org:4444

Mutex

9501956304f9daf11a329e0e62d89787

Attributes
  • reg_key

    9501956304f9daf11a329e0e62d89787

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_1249a130226433cade7ba31890f6f37c

    • Size

      268KB

    • MD5

      1249a130226433cade7ba31890f6f37c

    • SHA1

      4012785a1ae0cf850f879f07744431a73edc1560

    • SHA256

      aee4566c0079232220d05027859303ac5f76a6db6a1ee2ee8946f68bc9ac889d

    • SHA512

      ca649cbfc7f10d47b56d2f53c8bc52fce92bb1705c0be5f91205448b683e332863acec8cc48d0581ad9f19ec774fb4c8b23a16a42ae3fa853b5db34b4167c8bb

    • SSDEEP

      3072:U2ejuzN8baRYX2NCanoHXoJyWs12WD9Erugvntaxw9:Tej4EF4uRxw

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks