General

  • Target

    JaffaCakes118_65316d840dd564a3a8953807362607d0

  • Size

    23KB

  • Sample

    250102-pzfkxsslet

  • MD5

    65316d840dd564a3a8953807362607d0

  • SHA1

    0a8066aa06a75769dc28de8b0adf808402d9383a

  • SHA256

    813a8ab922fd7f79c4f48dfe3d1decf15996d0db6275f667b8096829033ef279

  • SHA512

    80a117b28a3cfda7ceb771b80b4ed8278e01436ec542544b5f352627cadc035ec494052def323d9f062a67eec8ff6283e844e889fb91b7a29748fea95342f866

  • SSDEEP

    384:zRWKCWs5Mx/YZPxvnjmQdFxH84GlQ6rgdAyZxLdmRvR6JZlbw8hqIusZzZI3:tmXAOvnjDdF9cRpcnux

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

naruto shpo

C2

boomhaker.zapto.org:5552

Mutex

790dd4a6c7e4bc576f75142f84fb9676

Attributes
  • reg_key

    790dd4a6c7e4bc576f75142f84fb9676

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_65316d840dd564a3a8953807362607d0

    • Size

      23KB

    • MD5

      65316d840dd564a3a8953807362607d0

    • SHA1

      0a8066aa06a75769dc28de8b0adf808402d9383a

    • SHA256

      813a8ab922fd7f79c4f48dfe3d1decf15996d0db6275f667b8096829033ef279

    • SHA512

      80a117b28a3cfda7ceb771b80b4ed8278e01436ec542544b5f352627cadc035ec494052def323d9f062a67eec8ff6283e844e889fb91b7a29748fea95342f866

    • SSDEEP

      384:zRWKCWs5Mx/YZPxvnjmQdFxH84GlQ6rgdAyZxLdmRvR6JZlbw8hqIusZzZI3:tmXAOvnjDdF9cRpcnux

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks