General

  • Target

    JaffaCakes118_6ba2d82059d78ec1ee0e66cd6ef7d540

  • Size

    48KB

  • Sample

    250103-lby6ksxjbz

  • MD5

    6ba2d82059d78ec1ee0e66cd6ef7d540

  • SHA1

    b1ec6ad1191d92bab6db689d0fef0e9871b5343d

  • SHA256

    f4fc76a5f222499ddaa29a622c5d63c9d64c501b48e0019b8c7406b968504970

  • SHA512

    0039b804ac000abd7a5d03c4aecbcabebe4814947069f87d62d6eda295c42392c0a56ef48ed2371dbfce8425d978bbfe2fff935ce66ce07b7e96d209701b4338

  • SSDEEP

    384:7PQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZWN:7Q5yBVd7Rpcnul

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKe

C2

abood147741.noip.me:81

Mutex

a97ce84ca9a41cc11067d577e03e41db

Attributes
  • reg_key

    a97ce84ca9a41cc11067d577e03e41db

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6ba2d82059d78ec1ee0e66cd6ef7d540

    • Size

      48KB

    • MD5

      6ba2d82059d78ec1ee0e66cd6ef7d540

    • SHA1

      b1ec6ad1191d92bab6db689d0fef0e9871b5343d

    • SHA256

      f4fc76a5f222499ddaa29a622c5d63c9d64c501b48e0019b8c7406b968504970

    • SHA512

      0039b804ac000abd7a5d03c4aecbcabebe4814947069f87d62d6eda295c42392c0a56ef48ed2371dbfce8425d978bbfe2fff935ce66ce07b7e96d209701b4338

    • SSDEEP

      384:7PQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZWN:7Q5yBVd7Rpcnul

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks