General

  • Target

    JaffaCakes118_56e0267d84770f5f7bbf17a247c42d10

  • Size

    22KB

  • Sample

    250101-qpq5cawmbs

  • MD5

    56e0267d84770f5f7bbf17a247c42d10

  • SHA1

    edffdadb0dcbaad2eecfa572d31e5e60bd4cac0d

  • SHA256

    1488363b4bd0805bd9f695fce241ed5d46f6d3f18468b29260ebc636d8e779b5

  • SHA512

    148caac22c228839d94bbd20ec22b21931f5ec0c07f991d7a97e435ca025db13cfd66f19702056a7c29af0f1c996dfbb097153ceafa4da4942d6e449f23ef295

  • SSDEEP

    384:lsqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZwOr:OSoQA6mlcrRpcnuLY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

xXx ViCTiM XxX

C2

dztopac123.no-ip.biz:1177

Mutex

ed6326bd1d310f33460dd91f3102668a

Attributes
  • reg_key

    ed6326bd1d310f33460dd91f3102668a

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_56e0267d84770f5f7bbf17a247c42d10

    • Size

      22KB

    • MD5

      56e0267d84770f5f7bbf17a247c42d10

    • SHA1

      edffdadb0dcbaad2eecfa572d31e5e60bd4cac0d

    • SHA256

      1488363b4bd0805bd9f695fce241ed5d46f6d3f18468b29260ebc636d8e779b5

    • SHA512

      148caac22c228839d94bbd20ec22b21931f5ec0c07f991d7a97e435ca025db13cfd66f19702056a7c29af0f1c996dfbb097153ceafa4da4942d6e449f23ef295

    • SSDEEP

      384:lsqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZwOr:OSoQA6mlcrRpcnuLY

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks