General

  • Target

    JaffaCakes118_6c5aa6123e51241bb10572f8d1c97fa0

  • Size

    598KB

  • Sample

    250103-ns5e2atrgj

  • MD5

    6c5aa6123e51241bb10572f8d1c97fa0

  • SHA1

    1c9e42c66f683b10621a8656d3f8cfe4192041c7

  • SHA256

    b2b1e60dfac1e1ac83daed0a84d0f242f0544de79fe7beaa8249e4e8f4a59632

  • SHA512

    ac3d2e72691d314c8546e3dc33b3a2bb1ed63c60631150d665b666a7812d83f8cbfb02b7c18a4b9042b48012ec4f36c40d40fe3c199a1c10300e8afb66bed893

  • SSDEEP

    12288:kS9PV4BzYtXkjJo1fLJNTsJQqY/v8tL/me7ZljHJ0PU0SyNq26uMMGds20eIS7BT:kS9PV4BzYtXkjJo1fLJNTsJQqY/v8tLH

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

خاروف

C2

medo-m919.no-ip.biz:1177

Mutex

dee4de9286cf6ca55b97bc4f481b14d6

Attributes
  • reg_key

    dee4de9286cf6ca55b97bc4f481b14d6

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6c5aa6123e51241bb10572f8d1c97fa0

    • Size

      598KB

    • MD5

      6c5aa6123e51241bb10572f8d1c97fa0

    • SHA1

      1c9e42c66f683b10621a8656d3f8cfe4192041c7

    • SHA256

      b2b1e60dfac1e1ac83daed0a84d0f242f0544de79fe7beaa8249e4e8f4a59632

    • SHA512

      ac3d2e72691d314c8546e3dc33b3a2bb1ed63c60631150d665b666a7812d83f8cbfb02b7c18a4b9042b48012ec4f36c40d40fe3c199a1c10300e8afb66bed893

    • SSDEEP

      12288:kS9PV4BzYtXkjJo1fLJNTsJQqY/v8tL/me7ZljHJ0PU0SyNq26uMMGds20eIS7BT:kS9PV4BzYtXkjJo1fLJNTsJQqY/v8tLH

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks