General

  • Target

    JaffaCakes118_78a760b935860aae018637773e3ca060

  • Size

    10KB

  • Sample

    250104-j811bs1mgs

  • MD5

    78a760b935860aae018637773e3ca060

  • SHA1

    dee2033ad2a15d2244feafab8dc45914cf14bbf6

  • SHA256

    1f47b620c6f768dd2cd3829a4e12e3709eeb42768df257b251214458d3301f79

  • SHA512

    58a360f017f809cce2418c2f8469c127af45d54c25ba2d464b6602f33f6924831d395f89658a7c15804415504a8e71688c776c5da04f6e409728d54dfa8510ec

  • SSDEEP

    192:GYgJqxLXAFVqk5QBZjfE2aHcrtaOiWni859xM2YF9hCRld5RcOhf0y26o:GxqxLXAakK1D8OxiC7MpM5iOh0ys

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ailail07821532043.no-ip.biz:1177

Mutex

9357b740612443fbb87cb8bfe74c902f

Attributes
  • reg_key

    9357b740612443fbb87cb8bfe74c902f

  • splitter

    |'|'|

Targets

    • Target

      1000.exe

    • Size

      23KB

    • MD5

      dccef00a6118f88b3d4d97714a6638fd

    • SHA1

      b47aa7bed75794fbd67547222601cda76cc80a6d

    • SHA256

      6938b477559cbdda70c83040c172bfcffd39c350d8ec4e2bc742c280ce8716ac

    • SHA512

      d89a655d41da3a43dd67f297509b090463f4ec739eaf75665d2a6d958c2f08dd7409e1744b51e2f2108e27342d4617fd72d8fc4381710e63995fbc1076be6990

    • SSDEEP

      384:wsqCm6yocx/Yp7jemiO0nd08/VQ6bgNQC5h7tmRvR6JZlbw8hqIusZzZhg:HSoQA6mlcrRpcnu9

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks