General

  • Target

    JaffaCakes118_1e26425e2d9093444f439c7fc8ff6fa6

  • Size

    331KB

  • Sample

    241231-qlc4bavjgp

  • MD5

    1e26425e2d9093444f439c7fc8ff6fa6

  • SHA1

    1295e8b827b873bdcf1a00829ccfc5127baf17ac

  • SHA256

    177e5e6fffcf864132a249ed93317f82696cad1262b87d0d8d5c1325f9417a76

  • SHA512

    781deeadeb45641aa7c1c460cd85e230d78fbe5af412eb1fc61513a0b801304384418f27e4ba7452f7175d5ea737e219c0d1267a679ec42742d7874a28d26f2d

  • SSDEEP

    1536:A6MOnxTaogXfz3OJ9rUrTvQEv4o6Ja8KDtI:8ZfQEAo6w8GI

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

64f5a500033a0279ebf3a243f9f3365c

Attributes
  • reg_key

    64f5a500033a0279ebf3a243f9f3365c

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_1e26425e2d9093444f439c7fc8ff6fa6

    • Size

      331KB

    • MD5

      1e26425e2d9093444f439c7fc8ff6fa6

    • SHA1

      1295e8b827b873bdcf1a00829ccfc5127baf17ac

    • SHA256

      177e5e6fffcf864132a249ed93317f82696cad1262b87d0d8d5c1325f9417a76

    • SHA512

      781deeadeb45641aa7c1c460cd85e230d78fbe5af412eb1fc61513a0b801304384418f27e4ba7452f7175d5ea737e219c0d1267a679ec42742d7874a28d26f2d

    • SSDEEP

      1536:A6MOnxTaogXfz3OJ9rUrTvQEv4o6Ja8KDtI:8ZfQEAo6w8GI

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks