General

  • Target

    JaffaCakes118_5f9c95d9d8a407e571b39aa87ffb0940

  • Size

    23KB

  • Sample

    250101-ww4a5szjdm

  • MD5

    5f9c95d9d8a407e571b39aa87ffb0940

  • SHA1

    8d5730b0c493ed8aa79d95bf32e205c03740431e

  • SHA256

    938ce47e013f4de375b8e8516307d8290f90e5154e9d4fa459c138e4373fc303

  • SHA512

    9ad235cf19413bcfd55252baacd7983551bd46de9e663eda5b0ca78073ac009b90211e0d612e0e59b9eed16d0a1bd072b420219ed276e953a160f1cbad730b12

  • SSDEEP

    384:GPQeCo2zmZbQHkJeCdUwMvQ6/gjuQBnB9mRvR6JZlbw8hqIusZzZbIT:GQ5yBVdqRpcnu6C

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

badrmesbahi1998.no-ip.biz:1177

Mutex

e5da7a5420ea197a81e433aaf2565955

Attributes
  • reg_key

    e5da7a5420ea197a81e433aaf2565955

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_5f9c95d9d8a407e571b39aa87ffb0940

    • Size

      23KB

    • MD5

      5f9c95d9d8a407e571b39aa87ffb0940

    • SHA1

      8d5730b0c493ed8aa79d95bf32e205c03740431e

    • SHA256

      938ce47e013f4de375b8e8516307d8290f90e5154e9d4fa459c138e4373fc303

    • SHA512

      9ad235cf19413bcfd55252baacd7983551bd46de9e663eda5b0ca78073ac009b90211e0d612e0e59b9eed16d0a1bd072b420219ed276e953a160f1cbad730b12

    • SSDEEP

      384:GPQeCo2zmZbQHkJeCdUwMvQ6/gjuQBnB9mRvR6JZlbw8hqIusZzZbIT:GQ5yBVdqRpcnu6C

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks