General

  • Target

    JaffaCakes118_1463c0cd150148a87d8138d937d75d58

  • Size

    48KB

  • Sample

    241231-mdxwzawkfs

  • MD5

    1463c0cd150148a87d8138d937d75d58

  • SHA1

    face30f9f86b9b186768d7b7a55a94a82baec7c9

  • SHA256

    628310cc8dcb88d452fd183e9086f5b57250e5a66efb148b3ac2b4f2964b9e34

  • SHA512

    ca8096eae148779da1ac28fa0f0fa56c7e291284969967d3c238a1e84a8001b095328fcdb226259b9e79d152250cb3169293f79f75db38e95049738c012d5c85

  • SSDEEP

    768:WrHiR5LwV5PLr3PpMbyS7Ue11ktBFUEZCsfKjfU9:WuRNwV5P/3SbyS7U4inUEZpofy

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

TSHFER

C2

the-don187.publicvm.com:1177

Mutex

aa3e6870fb514a8fc9560a3458429827

Attributes
  • reg_key

    aa3e6870fb514a8fc9560a3458429827

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_1463c0cd150148a87d8138d937d75d58

    • Size

      48KB

    • MD5

      1463c0cd150148a87d8138d937d75d58

    • SHA1

      face30f9f86b9b186768d7b7a55a94a82baec7c9

    • SHA256

      628310cc8dcb88d452fd183e9086f5b57250e5a66efb148b3ac2b4f2964b9e34

    • SHA512

      ca8096eae148779da1ac28fa0f0fa56c7e291284969967d3c238a1e84a8001b095328fcdb226259b9e79d152250cb3169293f79f75db38e95049738c012d5c85

    • SSDEEP

      768:WrHiR5LwV5PLr3PpMbyS7Ue11ktBFUEZCsfKjfU9:WuRNwV5P/3SbyS7U4inUEZpofy

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks