General

  • Target

    JaffaCakes118_7922da2db330c7cedb734bfab89d9ae0

  • Size

    238KB

  • Sample

    250104-mb868axlcm

  • MD5

    7922da2db330c7cedb734bfab89d9ae0

  • SHA1

    06ef4719628b701a30914cbb39927af02f09b311

  • SHA256

    7592cebfccba1ed4726d0a1fe75bf63abfdc30b8452345ec4954dd3c2473cb00

  • SHA512

    55a04722ebd215fe752811aff2d94b365d485c26bb3102fe9abc169e8d48102a35a58b069af17cad89755f05ec4e0447855452806721abfb96f6f7e88a739f1e

  • SSDEEP

    6144:otRRBVuQ8hMNYl2tgtCASsZhYUIKtAzM1+U:ot3BVt8hBl2tgtCLsZhYFy+M1

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

najrat13.no-ip.info:1177

Mutex

fe846520f3eb4e72966214ff26ac3a9d

Attributes
  • reg_key

    fe846520f3eb4e72966214ff26ac3a9d

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_7922da2db330c7cedb734bfab89d9ae0

    • Size

      238KB

    • MD5

      7922da2db330c7cedb734bfab89d9ae0

    • SHA1

      06ef4719628b701a30914cbb39927af02f09b311

    • SHA256

      7592cebfccba1ed4726d0a1fe75bf63abfdc30b8452345ec4954dd3c2473cb00

    • SHA512

      55a04722ebd215fe752811aff2d94b365d485c26bb3102fe9abc169e8d48102a35a58b069af17cad89755f05ec4e0447855452806721abfb96f6f7e88a739f1e

    • SSDEEP

      6144:otRRBVuQ8hMNYl2tgtCASsZhYUIKtAzM1+U:ot3BVt8hBl2tgtCLsZhYFy+M1

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks