General

  • Target

    JaffaCakes118_62264afb3bc5e26815eebdddab281190

  • Size

    22KB

  • Sample

    250102-c4rgrsynew

  • MD5

    62264afb3bc5e26815eebdddab281190

  • SHA1

    a60863c8e61d503709393020d1cbc6c20e6f18e9

  • SHA256

    2dfa22d9894818539bf406dc0ad624b2c6132901b802ff1ec9c3d720ba85c1c5

  • SHA512

    d99697065e1fe314e03806e1d7c0b9fa200b15a2c1d785dffe58056748dbfc790bbb0b52d8cbc8b70adcbb4e61d7372492ceadd2d907129368b71982916bcdae

  • SSDEEP

    384:Nc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZbp:ne9EJLN/yRpcnuq

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

salehadel33.no-ip.org:5552

Mutex

6346412397f89ae1d651742b9b177490

Attributes
  • reg_key

    6346412397f89ae1d651742b9b177490

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_62264afb3bc5e26815eebdddab281190

    • Size

      22KB

    • MD5

      62264afb3bc5e26815eebdddab281190

    • SHA1

      a60863c8e61d503709393020d1cbc6c20e6f18e9

    • SHA256

      2dfa22d9894818539bf406dc0ad624b2c6132901b802ff1ec9c3d720ba85c1c5

    • SHA512

      d99697065e1fe314e03806e1d7c0b9fa200b15a2c1d785dffe58056748dbfc790bbb0b52d8cbc8b70adcbb4e61d7372492ceadd2d907129368b71982916bcdae

    • SSDEEP

      384:Nc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZbp:ne9EJLN/yRpcnuq

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks