General

  • Target

    JaffaCakes118_6792a39bf671d4072534e4d91648d720

  • Size

    453KB

  • Sample

    250102-xywjraskd1

  • MD5

    6792a39bf671d4072534e4d91648d720

  • SHA1

    7007803aaff4e8de99a49ba0035f7447fa7d6f4c

  • SHA256

    bb60523263102e30304b879b02bac1179e07a2642232049beef4307a587c9a4a

  • SHA512

    03b0fe75629b2806e8521aa5ec50b36429cc955f23df0111e946e1f741b6922764caa25415fa1740c4dbc9d6745a148dca21b5d27ab7625a39d9be1c970fd54e

  • SSDEEP

    6144:hulQI4MikY0QVYf99hSTCciNuAPFvq3G8kH10Fj3cq45B7:cMkY0QcITCci35

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

reeem20102010.ddns.net:8080

Mutex

14d6da4c751dc9c96791754c828d69d3

Attributes
  • reg_key

    14d6da4c751dc9c96791754c828d69d3

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6792a39bf671d4072534e4d91648d720

    • Size

      453KB

    • MD5

      6792a39bf671d4072534e4d91648d720

    • SHA1

      7007803aaff4e8de99a49ba0035f7447fa7d6f4c

    • SHA256

      bb60523263102e30304b879b02bac1179e07a2642232049beef4307a587c9a4a

    • SHA512

      03b0fe75629b2806e8521aa5ec50b36429cc955f23df0111e946e1f741b6922764caa25415fa1740c4dbc9d6745a148dca21b5d27ab7625a39d9be1c970fd54e

    • SSDEEP

      6144:hulQI4MikY0QVYf99hSTCciNuAPFvq3G8kH10Fj3cq45B7:cMkY0QcITCci35

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks