General

  • Target

    JaffaCakes118_5c85732bd87cf170c6940bd4295205bd

  • Size

    64KB

  • Sample

    250101-t49f1svqek

  • MD5

    5c85732bd87cf170c6940bd4295205bd

  • SHA1

    87c80fa08f90298bdbeaba072bfa865fec4ad32b

  • SHA256

    ff712e3125edb1fff53504f41688b0199bbd1826c070d0e01a709466f18ff463

  • SHA512

    3c97f0439d1f3ab19e03d07503bc01ebe8b3a6ed54866ab509ff9a1027efee359eb16520091555c3672a28056e38ed78a67d90829659d68d94692ccd6a18f62d

  • SSDEEP

    768:ADJ7/Ypg+5uP3F1aRbISeFWvsiKPs942U5NDjRtynWUYq160PRgCZApW4p8wj5J:ADFQcSUmvsrsu5NZYnWCjFd4iwj3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

doosh1.ddns.net:1177

Mutex

85512046f02e2e40ac8b7817ba607078

Attributes
  • reg_key

    85512046f02e2e40ac8b7817ba607078

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_5c85732bd87cf170c6940bd4295205bd

    • Size

      64KB

    • MD5

      5c85732bd87cf170c6940bd4295205bd

    • SHA1

      87c80fa08f90298bdbeaba072bfa865fec4ad32b

    • SHA256

      ff712e3125edb1fff53504f41688b0199bbd1826c070d0e01a709466f18ff463

    • SHA512

      3c97f0439d1f3ab19e03d07503bc01ebe8b3a6ed54866ab509ff9a1027efee359eb16520091555c3672a28056e38ed78a67d90829659d68d94692ccd6a18f62d

    • SSDEEP

      768:ADJ7/Ypg+5uP3F1aRbISeFWvsiKPs942U5NDjRtynWUYq160PRgCZApW4p8wj5J:ADFQcSUmvsrsu5NZYnWCjFd4iwj3

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks