General

  • Target

    JaffaCakes118_61e4d01fd25bad27e4c44cb7d58f00b0

  • Size

    40KB

  • Sample

    250102-b4x4wayman

  • MD5

    61e4d01fd25bad27e4c44cb7d58f00b0

  • SHA1

    84c980d9850a1d556ebe3e4785af60110e2cc529

  • SHA256

    3b9c2a7e03861bd5d8517b76cc36c790042f1ca6e8c663c694dc5ed842f66fb8

  • SHA512

    4fc85e2d2808d12ef1b3d51bd1a3b5f7b9ca245e9b1cd27703b99124e6110f24d2fb02e3daa6b136ace713f70ecea73f7402b239213df3c15c5a1d456b9eaca1

  • SSDEEP

    384:r8aSyS9gB3Y1KIay2X8cLZI6XgxsGJVPpmRvR6JZlbw8hqIusZzZ37sBRrqaWATG:A589tXvRpcnuworK7s65vLDK

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Tily

C2

tilybrasil.zapto.org:5050

Mutex

754e7a8d48f7f5caf366855bb6973558

Attributes
  • reg_key

    754e7a8d48f7f5caf366855bb6973558

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_61e4d01fd25bad27e4c44cb7d58f00b0

    • Size

      40KB

    • MD5

      61e4d01fd25bad27e4c44cb7d58f00b0

    • SHA1

      84c980d9850a1d556ebe3e4785af60110e2cc529

    • SHA256

      3b9c2a7e03861bd5d8517b76cc36c790042f1ca6e8c663c694dc5ed842f66fb8

    • SHA512

      4fc85e2d2808d12ef1b3d51bd1a3b5f7b9ca245e9b1cd27703b99124e6110f24d2fb02e3daa6b136ace713f70ecea73f7402b239213df3c15c5a1d456b9eaca1

    • SSDEEP

      384:r8aSyS9gB3Y1KIay2X8cLZI6XgxsGJVPpmRvR6JZlbw8hqIusZzZ37sBRrqaWATG:A589tXvRpcnuworK7s65vLDK

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks