General

  • Target

    JaffaCakes118_79df6f253c287308304f5e3705e1b670

  • Size

    29KB

  • Sample

    250104-qgercatjaq

  • MD5

    79df6f253c287308304f5e3705e1b670

  • SHA1

    a679d8b793f26f93c5afa22e535b7628fe68be67

  • SHA256

    2d2fa47626534679c2c64548c8ed45ab1dfaaf5850265f9d36223c405f94cedc

  • SHA512

    d22c5a4ee18cc370753a94c81e6e137a12e4f962ed09985295671b38e676593f7a45eb75c3522c9b3bc9f8d5b793212e444bbd544cd30523c9cc17a02e51acbf

  • SSDEEP

    384:ixUHEBl7p3hUw2s7bD55gEKemqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzkr:i17bUw2C3kEcqNreHBKh0p29SgR2l

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

abukamal.hopto.org:1177

Mutex

5cd8f17f4086744065eb0992a09e05a2

Attributes
  • reg_key

    5cd8f17f4086744065eb0992a09e05a2

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_79df6f253c287308304f5e3705e1b670

    • Size

      29KB

    • MD5

      79df6f253c287308304f5e3705e1b670

    • SHA1

      a679d8b793f26f93c5afa22e535b7628fe68be67

    • SHA256

      2d2fa47626534679c2c64548c8ed45ab1dfaaf5850265f9d36223c405f94cedc

    • SHA512

      d22c5a4ee18cc370753a94c81e6e137a12e4f962ed09985295671b38e676593f7a45eb75c3522c9b3bc9f8d5b793212e444bbd544cd30523c9cc17a02e51acbf

    • SSDEEP

      384:ixUHEBl7p3hUw2s7bD55gEKemqDSqre/IDGBsbh0w4wlAokw9OhgOL1vYRGOZzkr:i17bUw2C3kEcqNreHBKh0p29SgR2l

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks