General

  • Target

    JaffaCakes118_63576009051871b0fea84610800829c0

  • Size

    427KB

  • Sample

    250102-hmm1xa1pgr

  • MD5

    63576009051871b0fea84610800829c0

  • SHA1

    00ddd48d617ef5f3b1ab2b4a6d61f7720f351951

  • SHA256

    6e37585d7469e4f38e734d8d86087fff1c2dcd52c1a94037f8e3d74e4fd2224b

  • SHA512

    a02974916c5f761f47d815fa5b4d59b23228522f5e6b2f204953d899feff20f7544fccc1f53e3cd5639e205cfa29b8bb2bc5faa1494265ac1ee2e51649878d32

  • SSDEEP

    12288:56Wq4aaE6KwyF5L0Y2D1PqLo3GTaLlSeCy:PthEVaPqLoPceX

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

301b5fcf8ce2fab8868e80b6c1f912fe

Attributes
  • reg_key

    301b5fcf8ce2fab8868e80b6c1f912fe

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_63576009051871b0fea84610800829c0

    • Size

      427KB

    • MD5

      63576009051871b0fea84610800829c0

    • SHA1

      00ddd48d617ef5f3b1ab2b4a6d61f7720f351951

    • SHA256

      6e37585d7469e4f38e734d8d86087fff1c2dcd52c1a94037f8e3d74e4fd2224b

    • SHA512

      a02974916c5f761f47d815fa5b4d59b23228522f5e6b2f204953d899feff20f7544fccc1f53e3cd5639e205cfa29b8bb2bc5faa1494265ac1ee2e51649878d32

    • SSDEEP

      12288:56Wq4aaE6KwyF5L0Y2D1PqLo3GTaLlSeCy:PthEVaPqLoPceX

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks