General

  • Target

    JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80

  • Size

    171KB

  • Sample

    250103-s5neha1mdt

  • MD5

    6daff7065db802cb1e78bbdbe2907d80

  • SHA1

    6532e5cecd2c3606b8dc2be11959cff4dbd5d2c2

  • SHA256

    7df2623cbf4a0611576e1f7859899084272d6ff59f67e7a66e1771fcde66bd1c

  • SHA512

    0349c5d93979cfa24ede4b3bb8ab9bd61d67d868a7cb1d55cbac0ff03a1eecda6d46106848541a26a538faf7a865582470c4d561d8b2c45b8bb761e2a67c3570

  • SSDEEP

    3072:ap6SSbb4HPwwPnetLrlyi2ayjrY/etoOOV402owBqRK6ggkCtF7:h4vwmRD+yhBqRK5Cf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

ZZZAU

C2

desgarrada1.no-ip.org:1177

Mutex

0da05431f6f5ca78981bce022c11b0b7

Attributes
  • reg_key

    0da05431f6f5ca78981bce022c11b0b7

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6daff7065db802cb1e78bbdbe2907d80

    • Size

      171KB

    • MD5

      6daff7065db802cb1e78bbdbe2907d80

    • SHA1

      6532e5cecd2c3606b8dc2be11959cff4dbd5d2c2

    • SHA256

      7df2623cbf4a0611576e1f7859899084272d6ff59f67e7a66e1771fcde66bd1c

    • SHA512

      0349c5d93979cfa24ede4b3bb8ab9bd61d67d868a7cb1d55cbac0ff03a1eecda6d46106848541a26a538faf7a865582470c4d561d8b2c45b8bb761e2a67c3570

    • SSDEEP

      3072:ap6SSbb4HPwwPnetLrlyi2ayjrY/etoOOV402owBqRK6ggkCtF7:h4vwmRD+yhBqRK5Cf

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks