General

  • Target

    JaffaCakes118_6e0cf92bc5a433170cb65467ffc4c7a0

  • Size

    81KB

  • Sample

    250103-vctf6atlfw

  • MD5

    6e0cf92bc5a433170cb65467ffc4c7a0

  • SHA1

    498e84529f4869e0efc0d94def30f68be69d4ce0

  • SHA256

    ebfb0317d4d1df0b27edf617ba139a70c2de4af41734facf12c6aa739149256f

  • SHA512

    17a25c9eecc888a8941b30282445f34c284e7d57031e7176a3584b54c34180b1459f9438d5a73147360bac923af3fcc4c6dc3cb4d45aa64b70d78a7f0506fe65

  • SSDEEP

    384:BluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9FmRvR6JZlbw8hqIusZzZQyo:WOmhtI+RpcnuvL

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

E X T R A

C2

174.127.99.175:1166

Mutex

4215198d9ee8caffb51b32ec2ae3b0ae

Attributes
  • reg_key

    4215198d9ee8caffb51b32ec2ae3b0ae

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6e0cf92bc5a433170cb65467ffc4c7a0

    • Size

      81KB

    • MD5

      6e0cf92bc5a433170cb65467ffc4c7a0

    • SHA1

      498e84529f4869e0efc0d94def30f68be69d4ce0

    • SHA256

      ebfb0317d4d1df0b27edf617ba139a70c2de4af41734facf12c6aa739149256f

    • SHA512

      17a25c9eecc888a8941b30282445f34c284e7d57031e7176a3584b54c34180b1459f9438d5a73147360bac923af3fcc4c6dc3cb4d45aa64b70d78a7f0506fe65

    • SSDEEP

      384:BluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9FmRvR6JZlbw8hqIusZzZQyo:WOmhtI+RpcnuvL

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks