General

  • Target

    JaffaCakes118_6c80efcfc093a31fff56e2a36003a553

  • Size

    128KB

  • Sample

    250103-n97lqawjcl

  • MD5

    6c80efcfc093a31fff56e2a36003a553

  • SHA1

    54de4dadaaff31a6bb38c3848eb7eece4f1fa5a1

  • SHA256

    efbed0cba9354564282171c65ce96bc18357e356db93643a0722f4d4431ac398

  • SHA512

    39e9a73f0add401a223c13a5919617c597200a07d25ecd08d5e9aedc7c379270bcad3294f7b83db099fb44fb223b0cd8aea903fc8125a2eb689d55b457ccbffe

  • SSDEEP

    3072:XhT2137DYmJtiTuXWmDXOqm8mCMEKBAKL+6SRmlzCw:XhRmXWmHmdCEDSc9Cw

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

softtofu.uy.to:5552

Mutex

a82bf85746d8b7324e1ca1c62b127de8

Attributes
  • reg_key

    a82bf85746d8b7324e1ca1c62b127de8

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6c80efcfc093a31fff56e2a36003a553

    • Size

      128KB

    • MD5

      6c80efcfc093a31fff56e2a36003a553

    • SHA1

      54de4dadaaff31a6bb38c3848eb7eece4f1fa5a1

    • SHA256

      efbed0cba9354564282171c65ce96bc18357e356db93643a0722f4d4431ac398

    • SHA512

      39e9a73f0add401a223c13a5919617c597200a07d25ecd08d5e9aedc7c379270bcad3294f7b83db099fb44fb223b0cd8aea903fc8125a2eb689d55b457ccbffe

    • SSDEEP

      3072:XhT2137DYmJtiTuXWmDXOqm8mCMEKBAKL+6SRmlzCw:XhRmXWmHmdCEDSc9Cw

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks