General

  • Target

    JaffaCakes118_68a39cf8442aacbc6bf955f1c4cf2e90

  • Size

    23KB

  • Sample

    250102-2kbpms1qcj

  • MD5

    68a39cf8442aacbc6bf955f1c4cf2e90

  • SHA1

    68d17ca7dad1bebd01721585b04896cf2269c88b

  • SHA256

    88ca79c718f3f881dee6e611bede6f508bb4ad1914c7dbf0546af22524b71d82

  • SHA512

    7177bb5fb73b8f9aabc9588fabc2834b74aa7fb00ad56b17ad45e0018ef2db4a56e304e43e6510183dde0d5a6f914b9e3c1904ca1abb807cf14b0eac2e2f78fc

  • SSDEEP

    384:Nc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZmKI:ne9EJLN/yRpcnuT

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

hussein1889.no-ip.biz:1177

Mutex

5a9ec245d72f27eba6af8c0e2d494050

Attributes
  • reg_key

    5a9ec245d72f27eba6af8c0e2d494050

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_68a39cf8442aacbc6bf955f1c4cf2e90

    • Size

      23KB

    • MD5

      68a39cf8442aacbc6bf955f1c4cf2e90

    • SHA1

      68d17ca7dad1bebd01721585b04896cf2269c88b

    • SHA256

      88ca79c718f3f881dee6e611bede6f508bb4ad1914c7dbf0546af22524b71d82

    • SHA512

      7177bb5fb73b8f9aabc9588fabc2834b74aa7fb00ad56b17ad45e0018ef2db4a56e304e43e6510183dde0d5a6f914b9e3c1904ca1abb807cf14b0eac2e2f78fc

    • SSDEEP

      384:Nc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZmKI:ne9EJLN/yRpcnuT

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks