General

  • Target

    JaffaCakes118_677071f559c7cad4c313a22be5a4ee40

  • Size

    41KB

  • Sample

    250102-xm7smsvkgr

  • MD5

    677071f559c7cad4c313a22be5a4ee40

  • SHA1

    cbe0a5797421ece9f03b7a6b9879a2c434e536e3

  • SHA256

    92a20fe6a9c19857f452666fe6eb1912ac3ce2b890e44a6487f1421b28bd9030

  • SHA512

    b25400b12bee8f9001847758a77d7a124b20261f56dd5047419a2d4286f3f06673d228ae24fc87b3f76d5d6def1b677d741a814b1a6ae08361917c65a4b42734

  • SSDEEP

    768:47bUw2C3kEcqNreHBKh0p29SgRI7UfVZYqPHo56:47bq7sKKhG29jI7eNI5

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

file

C2

taqtaq1.no-ip.biz:1177

Mutex

6390c2943d950e4a4a77855a54076f71

Attributes
  • reg_key

    6390c2943d950e4a4a77855a54076f71

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_677071f559c7cad4c313a22be5a4ee40

    • Size

      41KB

    • MD5

      677071f559c7cad4c313a22be5a4ee40

    • SHA1

      cbe0a5797421ece9f03b7a6b9879a2c434e536e3

    • SHA256

      92a20fe6a9c19857f452666fe6eb1912ac3ce2b890e44a6487f1421b28bd9030

    • SHA512

      b25400b12bee8f9001847758a77d7a124b20261f56dd5047419a2d4286f3f06673d228ae24fc87b3f76d5d6def1b677d741a814b1a6ae08361917c65a4b42734

    • SSDEEP

      768:47bUw2C3kEcqNreHBKh0p29SgRI7UfVZYqPHo56:47bq7sKKhG29jI7eNI5

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks