General

  • Target

    JaffaCakes118_62f6bf3919b207f71e97d7cf3a7d3e30

  • Size

    23KB

  • Sample

    250102-f8dy1sykaq

  • MD5

    62f6bf3919b207f71e97d7cf3a7d3e30

  • SHA1

    724cf40cec6aeff73846a90402b64548d131aefa

  • SHA256

    bca817d5fb168e4c75ab8a048f15dacd144a2cc6d236b8515cbde8a744136d6d

  • SHA512

    492fcaed29c0d15eac64d74cfc790825955f963d4162a6b30b3114745475f8ead7b5437b71887327f30525aed82ad8210aa66ec1d6eaf04eb735e0309ef6b927

  • SSDEEP

    384:Y8aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZ1c:eY+sNKqNHnSdRpcnuV

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

lifehax.no-ip.biz:1177

Mutex

a96bbda12dae4e001b16bb4e8340508e

Attributes
  • reg_key

    a96bbda12dae4e001b16bb4e8340508e

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_62f6bf3919b207f71e97d7cf3a7d3e30

    • Size

      23KB

    • MD5

      62f6bf3919b207f71e97d7cf3a7d3e30

    • SHA1

      724cf40cec6aeff73846a90402b64548d131aefa

    • SHA256

      bca817d5fb168e4c75ab8a048f15dacd144a2cc6d236b8515cbde8a744136d6d

    • SHA512

      492fcaed29c0d15eac64d74cfc790825955f963d4162a6b30b3114745475f8ead7b5437b71887327f30525aed82ad8210aa66ec1d6eaf04eb735e0309ef6b927

    • SSDEEP

      384:Y8aZYC9twBNdcvFaly2H0dbJo6HghcASEJqc/ZmRvR6JZlbw8hqIusZzZ1c:eY+sNKqNHnSdRpcnuV

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks