General

  • Target

    JaffaCakes118_6ce642a5f5b85d4413e5d5208ef63bb0

  • Size

    252KB

  • Sample

    250103-qhs1csymdk

  • MD5

    6ce642a5f5b85d4413e5d5208ef63bb0

  • SHA1

    d5cb29d0ee8a79d0cac7fb7c3f931ff1ef9dfe8d

  • SHA256

    128216965909750c3c0d86a972015d4152b56cadfefec98612354fc034c8d437

  • SHA512

    0b5ecd7077b6c9e1c6e85fe13cf9ad1677ba03b0802e6c3cac9110bf47d5e30b861e4a22cb65740e7a6f8126ba9e4c909f985323b05744368627a4beb8226422

  • SSDEEP

    3072:7x+QMgSXupDSbLiArQm7xf1f1V9oOqKPggd9pcTm5MRplHZs8pHgTvdj2k9Hc3/1:RTSeRSXBf1tHfH9N+Rr55ATvMk96kAD

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

twetter

C2

ezzbn.noip.me:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6ce642a5f5b85d4413e5d5208ef63bb0

    • Size

      252KB

    • MD5

      6ce642a5f5b85d4413e5d5208ef63bb0

    • SHA1

      d5cb29d0ee8a79d0cac7fb7c3f931ff1ef9dfe8d

    • SHA256

      128216965909750c3c0d86a972015d4152b56cadfefec98612354fc034c8d437

    • SHA512

      0b5ecd7077b6c9e1c6e85fe13cf9ad1677ba03b0802e6c3cac9110bf47d5e30b861e4a22cb65740e7a6f8126ba9e4c909f985323b05744368627a4beb8226422

    • SSDEEP

      3072:7x+QMgSXupDSbLiArQm7xf1f1V9oOqKPggd9pcTm5MRplHZs8pHgTvdj2k9Hc3/1:RTSeRSXBf1tHfH9N+Rr55ATvMk96kAD

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks