General

  • Target

    JaffaCakes118_63a1990643be12232c4f051cde3c5a00

  • Size

    24KB

  • Sample

    250102-jqz1basjdz

  • MD5

    63a1990643be12232c4f051cde3c5a00

  • SHA1

    05bbd7851bd4931c64049bfded20dfd3378cb00f

  • SHA256

    f209260f23170658aa3989825d80ed17c8eae2e1530a9e084435f4714bc9ee74

  • SHA512

    6d8f6346543f57a739294a5a464b482f5effc4d3c1ee5e3c5a8b215d3cfc2221288cd09f0febbff40d66a801439aebd55c7860345c93ee38ceeb3c9904f6deae

  • SSDEEP

    384:sfMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZtD:sYb9glF51LRpcnuO

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ahmednjrat1112.no-ip.biz:1177

Mutex

b7e30064d350e77a0cde4cedcbea0ba2

Attributes
  • reg_key

    b7e30064d350e77a0cde4cedcbea0ba2

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_63a1990643be12232c4f051cde3c5a00

    • Size

      24KB

    • MD5

      63a1990643be12232c4f051cde3c5a00

    • SHA1

      05bbd7851bd4931c64049bfded20dfd3378cb00f

    • SHA256

      f209260f23170658aa3989825d80ed17c8eae2e1530a9e084435f4714bc9ee74

    • SHA512

      6d8f6346543f57a739294a5a464b482f5effc4d3c1ee5e3c5a8b215d3cfc2221288cd09f0febbff40d66a801439aebd55c7860345c93ee38ceeb3c9904f6deae

    • SSDEEP

      384:sfMK6b2GZsx/Yr1+liORH1kcPFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZtD:sYb9glF51LRpcnuO

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks