General

  • Target

    JaffaCakes118_52406ab5bc64563c1eb544c201c943aa

  • Size

    276KB

  • Sample

    250101-mzpgqavqcp

  • MD5

    52406ab5bc64563c1eb544c201c943aa

  • SHA1

    54a8ff5e620f03a98adde2bb0eb42c7fc80d7c1c

  • SHA256

    473f047c2ce0905a6a93ce61e38ff40612c547560c433938c69eb27691e9868f

  • SHA512

    96dc4579bce2e8860f56b48231ae9a1dd0ac4ec71d5a058bfcc5991b2498521a36a018bfa7afbcaeaec116995803c45c93f1f0463d5135eb5a5c9e55a21871b6

  • SSDEEP

    6144:Pg9OvfU5US1IhI88u0p4tA5eyeNZmz85VBWYx07Q6D:IOv85zcI8vA5MnmwIYo/

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

server

C2

psycho77777.ddns.net:1177

Mutex

24b6054fc8f5be0070f08d51b2a1dd72

Attributes
  • reg_key

    24b6054fc8f5be0070f08d51b2a1dd72

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_52406ab5bc64563c1eb544c201c943aa

    • Size

      276KB

    • MD5

      52406ab5bc64563c1eb544c201c943aa

    • SHA1

      54a8ff5e620f03a98adde2bb0eb42c7fc80d7c1c

    • SHA256

      473f047c2ce0905a6a93ce61e38ff40612c547560c433938c69eb27691e9868f

    • SHA512

      96dc4579bce2e8860f56b48231ae9a1dd0ac4ec71d5a058bfcc5991b2498521a36a018bfa7afbcaeaec116995803c45c93f1f0463d5135eb5a5c9e55a21871b6

    • SSDEEP

      6144:Pg9OvfU5US1IhI88u0p4tA5eyeNZmz85VBWYx07Q6D:IOv85zcI8vA5MnmwIYo/

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks