General

  • Target

    JaffaCakes118_76e531d5c4e7ae6dd5df6e4eab140160

  • Size

    23KB

  • Sample

    250104-b74e3axkbn

  • MD5

    76e531d5c4e7ae6dd5df6e4eab140160

  • SHA1

    14d9fdd087c1b2e231d4fd50af680586dc7fdc3d

  • SHA256

    f08c1e72d20df4164a4684c2b7f308b20be28f6849c9329449f874db3830f9c1

  • SHA512

    0c65b3b67b472625a541b4acfaf388a77c832854aee36d98c0f06de58fceffbf4b374d93f93c782006b98c1c62b480c6c6b549c7bc2b4905afd7aeb67f5b3baf

  • SSDEEP

    384:7QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ6r:85yBVd7RpcnuH

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mohamad2050.ddns.net:1177

Mutex

6be03d370f97e2b1871652a3bc1cc5e5

Attributes
  • reg_key

    6be03d370f97e2b1871652a3bc1cc5e5

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_76e531d5c4e7ae6dd5df6e4eab140160

    • Size

      23KB

    • MD5

      76e531d5c4e7ae6dd5df6e4eab140160

    • SHA1

      14d9fdd087c1b2e231d4fd50af680586dc7fdc3d

    • SHA256

      f08c1e72d20df4164a4684c2b7f308b20be28f6849c9329449f874db3830f9c1

    • SHA512

      0c65b3b67b472625a541b4acfaf388a77c832854aee36d98c0f06de58fceffbf4b374d93f93c782006b98c1c62b480c6c6b549c7bc2b4905afd7aeb67f5b3baf

    • SSDEEP

      384:7QeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZ6r:85yBVd7RpcnuH

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks