General

  • Target

    JaffaCakes118_6c452e4307389d8c080581ada8533b30

  • Size

    152KB

  • Sample

    250103-nhhhhs1jdv

  • MD5

    6c452e4307389d8c080581ada8533b30

  • SHA1

    3c71d7a88a4c8c9cd4ff6ea0aa11c8303bb120f4

  • SHA256

    377e8b6994465df19adbfccb9ee24a8b207754ee31f66bd4af8a5a224def127a

  • SHA512

    8b2c67edf6ada70ae965eb511defdc03d4a746d615c1ef8501f5d5409863a99c2fa20b20b5f9588e29afc3ede78a2f6e89df657917f6dc839450256868623bf7

  • SSDEEP

    1536:WjYQWwalumK5lX1wR57CYqlvWWLm8JdHusLdkdeBOUEkzg:QYdwalP4wRpCZlRTOGdkgkU1zg

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Skpe

C2

127.0.0.1:82

Mutex

f6798bb33811c8cb4379b93ab0045476

Attributes
  • reg_key

    f6798bb33811c8cb4379b93ab0045476

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6c452e4307389d8c080581ada8533b30

    • Size

      152KB

    • MD5

      6c452e4307389d8c080581ada8533b30

    • SHA1

      3c71d7a88a4c8c9cd4ff6ea0aa11c8303bb120f4

    • SHA256

      377e8b6994465df19adbfccb9ee24a8b207754ee31f66bd4af8a5a224def127a

    • SHA512

      8b2c67edf6ada70ae965eb511defdc03d4a746d615c1ef8501f5d5409863a99c2fa20b20b5f9588e29afc3ede78a2f6e89df657917f6dc839450256868623bf7

    • SSDEEP

      1536:WjYQWwalumK5lX1wR57CYqlvWWLm8JdHusLdkdeBOUEkzg:QYdwalP4wRpCZlRTOGdkgkU1zg

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks