General

  • Target

    JaffaCakes118_7785159331bc0ca97acaa80f7c12d330

  • Size

    22KB

  • Sample

    250104-enav7azrex

  • MD5

    7785159331bc0ca97acaa80f7c12d330

  • SHA1

    1cc99dcaaf22b408cdbea2bd1023e826f8ff09fa

  • SHA256

    3ff402c91618eb5113b4d6a0244d23f591d23e9ffdca6ef353547f0887933831

  • SHA512

    b1033e6d7a57d69ee6deacf18f07b592d38088e65d1942f83d41961e85b932db7dadc62582febcb098397394f57dea1f60e0f70d25269a84f20b20e38929dee1

  • SSDEEP

    384:ZY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZd3:uL2s+tRyRpcnuG

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

aaaar2aaat2.ddns.net:1177

Mutex

0db2a9910c37358c68cca45ee851fe14

Attributes
  • reg_key

    0db2a9910c37358c68cca45ee851fe14

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_7785159331bc0ca97acaa80f7c12d330

    • Size

      22KB

    • MD5

      7785159331bc0ca97acaa80f7c12d330

    • SHA1

      1cc99dcaaf22b408cdbea2bd1023e826f8ff09fa

    • SHA256

      3ff402c91618eb5113b4d6a0244d23f591d23e9ffdca6ef353547f0887933831

    • SHA512

      b1033e6d7a57d69ee6deacf18f07b592d38088e65d1942f83d41961e85b932db7dadc62582febcb098397394f57dea1f60e0f70d25269a84f20b20e38929dee1

    • SSDEEP

      384:ZY324bcgPiJLQrfARGSRUJsbY6ZgvSMBD3t8mRvR6JZlbw8hqIusZzZd3:uL2s+tRyRpcnuG

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks