General

  • Target

    JaffaCakes118_778d851ee285deb89998b5578988f810

  • Size

    16KB

  • Sample

    250104-esqr7stkbr

  • MD5

    778d851ee285deb89998b5578988f810

  • SHA1

    ad6dd4cb0d344a22fc4e88205a9a2d5432c4e7b4

  • SHA256

    d0518ad96b2c42c799f9f0dc50f9043c7881095c5c17c068c44241b808e10988

  • SHA512

    10df7ef0d84fac4e4e5ba39b531afd255af52f4aa8570a3aa1fa643386c0cbcf77934c8bf6f71bacb9314a24a2b285d07946ddf35319a60a7778b529edaf0221

  • SSDEEP

    384:vxg+tkmi2R1PcDwj75UcKYsbm6k7PVFw2K4noN91JJ4jE1:y0kkR1UDq7xKYomH7tFw2K44AE1

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

blackmagix.no-ip.org:1177

Mutex

a49931bd13ad32f9534c94e1f51783c7

Attributes
  • reg_key

    a49931bd13ad32f9534c94e1f51783c7

  • splitter

    |'|'|

Targets

    • Target

      sample

    • Size

      29KB

    • MD5

      2a8847ebfe7ab2f15d166640d196b9ab

    • SHA1

      5855abd2d9e15c9a7dfc96b08b737fe664433478

    • SHA256

      19e0a51ad19bda6e5ddd16b4d3954dc959b832b3cd8c23478ee3524015bca350

    • SHA512

      fcfc0077d8a40f1996b7eca425045c9f37ae28bd78b5dbf617fdd8cecd3162b603d968523e30ba04182989049b66dd41fde5f35edc54a12f10f9f82571075f7b

    • SSDEEP

      768:j7RmpgGD1BH9D8qbILeuBKh0p29SgRs2:j7RKIcIrKhG29js2

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks