General

  • Target

    JaffaCakes118_7be5c8a7edcc9ee2eb6f7d75623058f0

  • Size

    94KB

  • Sample

    250104-1lq1aaynbx

  • MD5

    7be5c8a7edcc9ee2eb6f7d75623058f0

  • SHA1

    636bbbd64d414de1a076b18e80787e3cff56b9d7

  • SHA256

    e82dab66d9eee1e6773914621820e09af5edaf3872154cb6b788d3fe672cf178

  • SHA512

    a9a352ee920278fd1f03e607809ae57ddb0553a7a17f72012e8e3434b6ee48f22eb63d26aba0bbb0370ce8f7bfbe7f1c8e4f3f490c12352a134b15b32c95f3aa

  • SSDEEP

    1536:9lWhT3kaxkhF4yaAZsVQZ+Mj0PcbWBL6edOyDA4QsytmsXNYlfXX25p0DLYtnT3c:9Yh4mZd3r3w0uo07ijMra

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

279f6960ed84a752570aca7fb2dc1552

Attributes
  • reg_key

    279f6960ed84a752570aca7fb2dc1552

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_7be5c8a7edcc9ee2eb6f7d75623058f0

    • Size

      94KB

    • MD5

      7be5c8a7edcc9ee2eb6f7d75623058f0

    • SHA1

      636bbbd64d414de1a076b18e80787e3cff56b9d7

    • SHA256

      e82dab66d9eee1e6773914621820e09af5edaf3872154cb6b788d3fe672cf178

    • SHA512

      a9a352ee920278fd1f03e607809ae57ddb0553a7a17f72012e8e3434b6ee48f22eb63d26aba0bbb0370ce8f7bfbe7f1c8e4f3f490c12352a134b15b32c95f3aa

    • SSDEEP

      1536:9lWhT3kaxkhF4yaAZsVQZ+Mj0PcbWBL6edOyDA4QsytmsXNYlfXX25p0DLYtnT3c:9Yh4mZd3r3w0uo07ijMra

    • Njrat family

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks