General

  • Target

    JaffaCakes118_6d5ee70fad22d6b4ab7c1bc462e79670

  • Size

    179KB

  • Sample

    250103-r3dxlsskhp

  • MD5

    6d5ee70fad22d6b4ab7c1bc462e79670

  • SHA1

    f4ac06aa219cb4b97e480e83a1b069f3e8408608

  • SHA256

    c76495023894a45401ea163bde2bc84fb8d980d5863b83b42399a7ad627c0db5

  • SHA512

    da99968236b176d78c7d8ac3505f58b4ee3bdcfc9ba4aa040616a9797e7d7ee52abe8eee0f09da7150637591605d19b79fead27d9d30ede50d44c9f001dd2c19

  • SSDEEP

    3072:JPzVfsNDKRtnYXGCRCoyx4wnExKMrZMsqZJbbsqQRnpA0UJU3FtWWHfvEaSf/iUc:dzVfsNORvRonwnMvq2RndEkwFajGW3

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

helpme.no-ip.org:125

Mutex

d3ebde779cbee84dd0766682e20bc01a

Attributes
  • reg_key

    d3ebde779cbee84dd0766682e20bc01a

  • splitter

    |'|'|

Targets

    • Target

      ddoser.exe

    • Size

      281KB

    • MD5

      de48356fb8a7fa2570780ae5dbdfdab1

    • SHA1

      47aa1a6f2819d5a7b7c0b33bb80192baf7945e12

    • SHA256

      3ef8d2346a9ef2401693b3333ee0cc9e832d17995d0ff3e91addf540ff7b4331

    • SHA512

      8000cbef63ec9e6cddee5cdfd897080b2c4cf0691ddd965fefdb5b6a4853d17a37a2227ecb58391f96993b05dd49e5094f3a8e2f87fcf7b18daddf34f7f02b86

    • SSDEEP

      6144:oAuR/sh1xjHRonwn6vqCdOiALj1s/jdsG9Z5vZ5vCUC7tz82FyaR:iJsh177nirOketz82

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks