General

  • Target

    JaffaCakes118_69ad791bb214be03ea3be990957f53c0

  • Size

    23KB

  • Sample

    250103-czhztswjav

  • MD5

    69ad791bb214be03ea3be990957f53c0

  • SHA1

    31b3fe77bd7e105e40cec15d55ef9ee59aa75f2f

  • SHA256

    f0ff3cd04741d04ea8fca4e11816c256ccae2769cabf036e2474170c4d480c4d

  • SHA512

    d6727ecf8c8ce1b23ab8dbcc36db1ab95f2b5e9d23508fd26548abc542fb348f24951dbf54dc5a7fd94d4803d42bb59b33f991b8045a125e2c6cf50b7592719d

  • SSDEEP

    384:H8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZbDlU:8Xcwt3tRpcnuSi

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:1177

Mutex

212683d986fb740ad6a40184df48e604

Attributes
  • reg_key

    212683d986fb740ad6a40184df48e604

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_69ad791bb214be03ea3be990957f53c0

    • Size

      23KB

    • MD5

      69ad791bb214be03ea3be990957f53c0

    • SHA1

      31b3fe77bd7e105e40cec15d55ef9ee59aa75f2f

    • SHA256

      f0ff3cd04741d04ea8fca4e11816c256ccae2769cabf036e2474170c4d480c4d

    • SHA512

      d6727ecf8c8ce1b23ab8dbcc36db1ab95f2b5e9d23508fd26548abc542fb348f24951dbf54dc5a7fd94d4803d42bb59b33f991b8045a125e2c6cf50b7592719d

    • SSDEEP

      384:H8aLWS0dABLYVq6RxP8MDFF09vK563gRMmJKUv0mRvR6JZlbw8hqIusZzZbDlU:8Xcwt3tRpcnuSi

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks