General

  • Target

    JaffaCakes118_6670b5ca013576c1221ba87d9fb349a0

  • Size

    24KB

  • Sample

    250102-tvf34sxqgv

  • MD5

    6670b5ca013576c1221ba87d9fb349a0

  • SHA1

    1ff170786e670149cddd702a90c8a5c0ccfc3186

  • SHA256

    cf4dfe65f25fbf6221a767f45d1cc7f98c4cd972560d9c3a2d70cf9b87dbf644

  • SHA512

    7d36bc4c070dd4eedb281ae2fd78240fc42fd1c280bc18b7ff3149f7ad5ab44a1ad087dfb44916944d8fced09b7ad6b6ca963f787f272ff93098acc156359df2

  • SSDEEP

    384:qc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZvc:qe9EJLN/yRpcnuz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

anwarmaxa.no-ip.biz:4498

Mutex

abc4c646bbdae26ea820ad4be4d0c672

Attributes
  • reg_key

    abc4c646bbdae26ea820ad4be4d0c672

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6670b5ca013576c1221ba87d9fb349a0

    • Size

      24KB

    • MD5

      6670b5ca013576c1221ba87d9fb349a0

    • SHA1

      1ff170786e670149cddd702a90c8a5c0ccfc3186

    • SHA256

      cf4dfe65f25fbf6221a767f45d1cc7f98c4cd972560d9c3a2d70cf9b87dbf644

    • SHA512

      7d36bc4c070dd4eedb281ae2fd78240fc42fd1c280bc18b7ff3149f7ad5ab44a1ad087dfb44916944d8fced09b7ad6b6ca963f787f272ff93098acc156359df2

    • SSDEEP

      384:qc6ze6e1PAhJVzC3tC1im/BsTx46PgZ0rap9HBmRvR6JZlbw8hqIusZzZvc:qe9EJLN/yRpcnuz

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks