General

  • Target

    JaffaCakes118_6e8c46674f223379c3ed11dd5dc9f2c0

  • Size

    439KB

  • Sample

    250103-wwq1tawphy

  • MD5

    6e8c46674f223379c3ed11dd5dc9f2c0

  • SHA1

    5e17cc2788fc4a909ee65b102ac33e66aff3f34c

  • SHA256

    14cfc755a46bfad1af048584d599344cc9043f20ff6727c04901bc5cb585521b

  • SHA512

    902f581ea4506f3cdebe64cee161a789fd578e2e88fb831c87ffcf20a9ebfaa645ee9ea6ad601a9730a9efba3f31efbeb833a2777a3d7c917914bd3c69601596

  • SSDEEP

    3072:qzQ7tyn3XA5GskpIZWWH2iWZ2bcmkgfX9Dv01x12:vta3iGskpIPW52b9k8XWj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

maxxrocker.dlinkddns.com:80

Mutex

ba07a9c5c9c406a4294ab8bfe0b42da4

Attributes
  • reg_key

    ba07a9c5c9c406a4294ab8bfe0b42da4

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6e8c46674f223379c3ed11dd5dc9f2c0

    • Size

      439KB

    • MD5

      6e8c46674f223379c3ed11dd5dc9f2c0

    • SHA1

      5e17cc2788fc4a909ee65b102ac33e66aff3f34c

    • SHA256

      14cfc755a46bfad1af048584d599344cc9043f20ff6727c04901bc5cb585521b

    • SHA512

      902f581ea4506f3cdebe64cee161a789fd578e2e88fb831c87ffcf20a9ebfaa645ee9ea6ad601a9730a9efba3f31efbeb833a2777a3d7c917914bd3c69601596

    • SSDEEP

      3072:qzQ7tyn3XA5GskpIZWWH2iWZ2bcmkgfX9Dv01x12:vta3iGskpIPW52b9k8XWj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks