General

  • Target

    JaffaCakes118_6be9086d115dd1b8056987f2214e9230

  • Size

    23KB

  • Sample

    250103-l95e9aykay

  • MD5

    6be9086d115dd1b8056987f2214e9230

  • SHA1

    60810fca5ccaab8ed9dd384b0aec27fbfa18e7a3

  • SHA256

    681138b7b667d2449e2c2da65c905dc1630e3b8ff72a14db0a62587a0364b3c5

  • SHA512

    812d0d801595432b89823137e903ecb677efbd40fe4da3d1c21df12c969de4463ff2d847202715459bf2ca8295083dced18665272c08fc754f80421569f10737

  • SSDEEP

    384:ffQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZEW:fA5yBVd7RpcnuM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NIGGUH

C2

iamsprey.ddns.net:1605

Mutex

4d50ff0f3a4eb213da8fe301253af367

Attributes
  • reg_key

    4d50ff0f3a4eb213da8fe301253af367

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6be9086d115dd1b8056987f2214e9230

    • Size

      23KB

    • MD5

      6be9086d115dd1b8056987f2214e9230

    • SHA1

      60810fca5ccaab8ed9dd384b0aec27fbfa18e7a3

    • SHA256

      681138b7b667d2449e2c2da65c905dc1630e3b8ff72a14db0a62587a0364b3c5

    • SHA512

      812d0d801595432b89823137e903ecb677efbd40fe4da3d1c21df12c969de4463ff2d847202715459bf2ca8295083dced18665272c08fc754f80421569f10737

    • SSDEEP

      384:ffQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZEW:fA5yBVd7RpcnuM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.