General

  • Target

    JaffaCakes118_61cd32c0115bbe2155b047d97ead0770

  • Size

    126KB

  • Sample

    250102-bq4phaxnfl

  • MD5

    61cd32c0115bbe2155b047d97ead0770

  • SHA1

    f05447cfd938a837de67cfe843555696dbfdf96a

  • SHA256

    f171a94241d09383c5c3d8f0393fb4f9ef7aeefa05ea3ebabae60566be7ebb1d

  • SHA512

    f7da835e65906d406b6e64f85e9405c9843978c31baa46f618d95321a35f4e36c68128769145c3859b9d78c13f073b4a4536fd62a31dc892a201496f756268ce

  • SSDEEP

    1536:975CPkj8KhG29jn4geWklluiIPOuaxrgJeu4a6I:3CcjbA29UXuDt4N

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

maaher1.no-ip.biz:5552

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_61cd32c0115bbe2155b047d97ead0770

    • Size

      126KB

    • MD5

      61cd32c0115bbe2155b047d97ead0770

    • SHA1

      f05447cfd938a837de67cfe843555696dbfdf96a

    • SHA256

      f171a94241d09383c5c3d8f0393fb4f9ef7aeefa05ea3ebabae60566be7ebb1d

    • SHA512

      f7da835e65906d406b6e64f85e9405c9843978c31baa46f618d95321a35f4e36c68128769145c3859b9d78c13f073b4a4536fd62a31dc892a201496f756268ce

    • SSDEEP

      1536:975CPkj8KhG29jn4geWklluiIPOuaxrgJeu4a6I:3CcjbA29UXuDt4N

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks