General

  • Target

    JaffaCakes118_6081d526ddb3c4b281506bc366eba1d0

  • Size

    11KB

  • Sample

    250101-zafjqssphx

  • MD5

    6081d526ddb3c4b281506bc366eba1d0

  • SHA1

    d16aecfb6781790a5eec7ecaac4bc497130638a9

  • SHA256

    a91818afca0774910c2d2b70731d26d59561aab450235ec16ba7f8120caa3718

  • SHA512

    3ab6b0c52234cf1ba8fd6a4c730e31712307ef891c77d70f0a04bcfe1581902e7661582baf240e29d61f496a5a9bd9f7646fa601c292d8e88ed6fa3f47dcec74

  • SSDEEP

    192:oJDjqWx/u/mvRqdD0pCcivlSEsp/7P1idgwVwFKN8yeysycLj1JImRL2K:oEO/6mMdDqbilI/7PC5QfL7IY

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Mr.Black Hack

C2

127.0.0.1:5552

Mutex

174c5beaaab0252002ef1fe5676b6863

Attributes
  • reg_key

    174c5beaaab0252002ef1fe5676b6863

  • splitter

    |'|'|

Targets

    • Target

      sample

    • Size

      23KB

    • MD5

      cfafc457b9af188d615d4760a4c5e35d

    • SHA1

      577b3a0061d386390cc9b48ed74e8fa2e4572bca

    • SHA256

      1a668b3c7f20fe9607344da0b6c0bf291416f1fe397f4c542cfc6f95acfc480c

    • SHA512

      b19f71c42001cdc03114c57bc189416a4e73a8bd26d75e0dee180a162fe25f729abc9d4c99bbcd9b9d780cf3166ad9972466a060d772e600c14895c23bc1dd02

    • SSDEEP

      384:qwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RRmRvR6JZlbw8hqIusZzZKuG:pvZiBK1edNRpcnu5h

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks