General

  • Target

    JaffaCakes118_63c2605da147dd996cf67dbab271ecd0

  • Size

    950KB

  • Sample

    250102-j6rnwasqgy

  • MD5

    63c2605da147dd996cf67dbab271ecd0

  • SHA1

    7f58a8a3e59348a62a7cc2260aa3b3e9fb2c7de6

  • SHA256

    1315a24934797f7bcacf88f31146fe7bb40646e3febe9b5548db14d1e9af6270

  • SHA512

    0e7aee9cc9a193c7457f0dc1a4470f3b6ec414f5506e8a7f778af5b442720cb8c1f568b028ce118cc69ad52e4152f7738b0a32079bbbe3372a1dde4357642cef

  • SSDEEP

    24576:EwfOoOVRYnqdlSOHtInpmrYPBQ5vMQvS1wUb:Ewmo2YnqdlSOKpmrYPB2vM4mw

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Victime by achreef

C2

0523.no-ip.biz:1543

Mutex

1522a860fc4f8a79b71476fd27d96fe9

Attributes
  • reg_key

    1522a860fc4f8a79b71476fd27d96fe9

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_63c2605da147dd996cf67dbab271ecd0

    • Size

      950KB

    • MD5

      63c2605da147dd996cf67dbab271ecd0

    • SHA1

      7f58a8a3e59348a62a7cc2260aa3b3e9fb2c7de6

    • SHA256

      1315a24934797f7bcacf88f31146fe7bb40646e3febe9b5548db14d1e9af6270

    • SHA512

      0e7aee9cc9a193c7457f0dc1a4470f3b6ec414f5506e8a7f778af5b442720cb8c1f568b028ce118cc69ad52e4152f7738b0a32079bbbe3372a1dde4357642cef

    • SSDEEP

      24576:EwfOoOVRYnqdlSOHtInpmrYPBQ5vMQvS1wUb:Ewmo2YnqdlSOKpmrYPB2vM4mw

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks