General

  • Target

    JaffaCakes118_6079b2fccc047c315bd3a2d69fcd2a60

  • Size

    45KB

  • Sample

    250101-y6efwavmam

  • MD5

    6079b2fccc047c315bd3a2d69fcd2a60

  • SHA1

    a81539df25997e19fe911b885eea26a69784731a

  • SHA256

    73faacbd90f740cd6efe93cfa92c47b23beb7679a43d2dcbad4a435d84cd270b

  • SHA512

    ce502ee386f0eebba33b1dc8de83ce3f0dad23d1a6788969ad902fc6629767600293cb9435ffee5743ef7f0f6752bf024af7996e745d0c44dd7163ce4389984b

  • SSDEEP

    768:XA7N43zjQOaObNBVOE/4z7eB7F1pWZy9A2u6fwvmXOPKMK2r:w763wOaObNBhw67F1pWk9E6YpCM7

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

betabetabetabeta.no-ip.info:5552

Mutex

5d31a1ca43a2f478d6483da11bf5d515

Attributes
  • reg_key

    5d31a1ca43a2f478d6483da11bf5d515

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6079b2fccc047c315bd3a2d69fcd2a60

    • Size

      45KB

    • MD5

      6079b2fccc047c315bd3a2d69fcd2a60

    • SHA1

      a81539df25997e19fe911b885eea26a69784731a

    • SHA256

      73faacbd90f740cd6efe93cfa92c47b23beb7679a43d2dcbad4a435d84cd270b

    • SHA512

      ce502ee386f0eebba33b1dc8de83ce3f0dad23d1a6788969ad902fc6629767600293cb9435ffee5743ef7f0f6752bf024af7996e745d0c44dd7163ce4389984b

    • SSDEEP

      768:XA7N43zjQOaObNBVOE/4z7eB7F1pWZy9A2u6fwvmXOPKMK2r:w763wOaObNBhw67F1pWk9E6YpCM7

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks