General

  • Target

    JaffaCakes118_67e68317591942846cb44884a0d5f380

  • Size

    43KB

  • Sample

    250102-ynp5natmhz

  • MD5

    67e68317591942846cb44884a0d5f380

  • SHA1

    e39aeb33f43ec1f72fae8b2aa132bc804c311b06

  • SHA256

    5a42fb8cd6463b23d1b5d56e123429f7e38b2abab1a0baa7b74e8ee128054651

  • SHA512

    c6fbe7020499f65e0f175b3e96d37966b7f88a44879912745af06c2b53aa1894f50eceb4a5470546dbb0030e7307af6d384695902fb2bd30d1b8b79b737cb905

  • SSDEEP

    768:hg1cK3SMcDA9lRQO8BMUBkJBMBb6Rk9WeYxTXkiHj0g/l3t:hguG4OlRQDBBBkfM9myYxT02jTd

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

attia.no-ip.biz:1177

Mutex

a8a98371e314c9de13f333a4ac27e8f6

Attributes
  • reg_key

    a8a98371e314c9de13f333a4ac27e8f6

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_67e68317591942846cb44884a0d5f380

    • Size

      43KB

    • MD5

      67e68317591942846cb44884a0d5f380

    • SHA1

      e39aeb33f43ec1f72fae8b2aa132bc804c311b06

    • SHA256

      5a42fb8cd6463b23d1b5d56e123429f7e38b2abab1a0baa7b74e8ee128054651

    • SHA512

      c6fbe7020499f65e0f175b3e96d37966b7f88a44879912745af06c2b53aa1894f50eceb4a5470546dbb0030e7307af6d384695902fb2bd30d1b8b79b737cb905

    • SSDEEP

      768:hg1cK3SMcDA9lRQO8BMUBkJBMBb6Rk9WeYxTXkiHj0g/l3t:hguG4OlRQDBBBkfM9myYxT02jTd

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks