General

  • Target

    JaffaCakes118_6be9086d115dd1b8056987f2214e9230

  • Size

    23KB

  • Sample

    250103-l95e9aykay

  • MD5

    6be9086d115dd1b8056987f2214e9230

  • SHA1

    60810fca5ccaab8ed9dd384b0aec27fbfa18e7a3

  • SHA256

    681138b7b667d2449e2c2da65c905dc1630e3b8ff72a14db0a62587a0364b3c5

  • SHA512

    812d0d801595432b89823137e903ecb677efbd40fe4da3d1c21df12c969de4463ff2d847202715459bf2ca8295083dced18665272c08fc754f80421569f10737

  • SSDEEP

    384:ffQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZEW:fA5yBVd7RpcnuM

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

NIGGUH

C2

iamsprey.ddns.net:1605

Mutex

4d50ff0f3a4eb213da8fe301253af367

Attributes
  • reg_key

    4d50ff0f3a4eb213da8fe301253af367

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6be9086d115dd1b8056987f2214e9230

    • Size

      23KB

    • MD5

      6be9086d115dd1b8056987f2214e9230

    • SHA1

      60810fca5ccaab8ed9dd384b0aec27fbfa18e7a3

    • SHA256

      681138b7b667d2449e2c2da65c905dc1630e3b8ff72a14db0a62587a0364b3c5

    • SHA512

      812d0d801595432b89823137e903ecb677efbd40fe4da3d1c21df12c969de4463ff2d847202715459bf2ca8295083dced18665272c08fc754f80421569f10737

    • SSDEEP

      384:ffQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZEW:fA5yBVd7RpcnuM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks