General

  • Target

    JaffaCakes118_6f7e104563ae7c4f45b663c14c50dbb0

  • Size

    44KB

  • Sample

    250103-zh79qasmg1

  • MD5

    6f7e104563ae7c4f45b663c14c50dbb0

  • SHA1

    94abdc26dae5d021c1af4954056cb603b7efcc24

  • SHA256

    5018b51220457c3f8a1bb6b6cc928c6da15ae3a8aaeab9ff27289b1628427f6e

  • SHA512

    7949a08a72d4ead00c899f43a8dcbf1ef3460472806cd60f81595ca761bfe1cae6d167078dfbe620330ab105a0010766a607862fb01269cb11cb6341d93918fd

  • SSDEEP

    768:vSmG15H778r/ZORxYMurJvIF6gZNw6E7hKZ3mMv:0cLUfE7h4v

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Dz JoKéR

C2

abdou-joker.no-ip.biz:1177

Mutex

7350b4ce4c5b9059b3abecb448b12322

Attributes
  • reg_key

    7350b4ce4c5b9059b3abecb448b12322

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6f7e104563ae7c4f45b663c14c50dbb0

    • Size

      44KB

    • MD5

      6f7e104563ae7c4f45b663c14c50dbb0

    • SHA1

      94abdc26dae5d021c1af4954056cb603b7efcc24

    • SHA256

      5018b51220457c3f8a1bb6b6cc928c6da15ae3a8aaeab9ff27289b1628427f6e

    • SHA512

      7949a08a72d4ead00c899f43a8dcbf1ef3460472806cd60f81595ca761bfe1cae6d167078dfbe620330ab105a0010766a607862fb01269cb11cb6341d93918fd

    • SSDEEP

      768:vSmG15H778r/ZORxYMurJvIF6gZNw6E7hKZ3mMv:0cLUfE7h4v

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks