General

  • Target

    JaffaCakes118_66f357009761da16ba97118cf921f030

  • Size

    97KB

  • Sample

    250102-wav3mszlg1

  • MD5

    66f357009761da16ba97118cf921f030

  • SHA1

    7fa0857714cbfc108bf92ba81ea55a04f3adbafb

  • SHA256

    1b8213f36e6aca9379292c1e2d77c46351703b89936d1e892c95a9496f83cb61

  • SHA512

    9b77ef66e4dafec78a7bc5014aeff22e460a3ea7ec23ca1395a8e4cb741975005ab525f0e72db65ba58a9ca5bcd54b23f09c8b110082211094189e3555525a4c

  • SSDEEP

    1536:BbL7oRv1uhlfShVjSEYTdp0u3p0WIkyZDKeO2XXZuF23CLyOHKr0hnv:9EyhMPYTdpFZnIk4DKeO2VbOHo0Bv

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

<<L~0~0~K >>

C2

microsoft-help.myvnc.com:211

Mutex

7484964710ffec0dd0c0abcd35c14b2c

Attributes
  • reg_key

    7484964710ffec0dd0c0abcd35c14b2c

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_66f357009761da16ba97118cf921f030

    • Size

      97KB

    • MD5

      66f357009761da16ba97118cf921f030

    • SHA1

      7fa0857714cbfc108bf92ba81ea55a04f3adbafb

    • SHA256

      1b8213f36e6aca9379292c1e2d77c46351703b89936d1e892c95a9496f83cb61

    • SHA512

      9b77ef66e4dafec78a7bc5014aeff22e460a3ea7ec23ca1395a8e4cb741975005ab525f0e72db65ba58a9ca5bcd54b23f09c8b110082211094189e3555525a4c

    • SSDEEP

      1536:BbL7oRv1uhlfShVjSEYTdp0u3p0WIkyZDKeO2XXZuF23CLyOHKr0hnv:9EyhMPYTdpFZnIk4DKeO2VbOHo0Bv

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks