General

  • Target

    JaffaCakes118_7ab1f328d60b07ede7104e3e9d22fbc0

  • Size

    132KB

  • Sample

    250104-t3dmysxmf1

  • MD5

    7ab1f328d60b07ede7104e3e9d22fbc0

  • SHA1

    4d4cc69badfc20d17b0c8be0fbe36d1e6b189190

  • SHA256

    1e5979b249c10d72a89ea37e4a519b9a4b26544ddb9a458b2631ebd4d47655b9

  • SHA512

    1c0a9b69fb8ee72554d9f16c5e45a8bd1fbf2836b7184498e63e46332822c8c0aab9f44a703a9e389a2ee16590db48950042ebda07a69a471e19c985a54eba3f

  • SSDEEP

    1536:zuxAI7bH0oZ2pu4dOEqXWLJuQH42iL5KNWLqlOTIr7qeZ/nCChp8t3435Yhf0OAh:o352/1qXmJLvNWLql7F9ylYYx2h

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

wasewase.no-ip.biz:1177

Mutex

a0c0812f6711887b8c1bd7a61da43ae4

Attributes
  • reg_key

    a0c0812f6711887b8c1bd7a61da43ae4

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_7ab1f328d60b07ede7104e3e9d22fbc0

    • Size

      132KB

    • MD5

      7ab1f328d60b07ede7104e3e9d22fbc0

    • SHA1

      4d4cc69badfc20d17b0c8be0fbe36d1e6b189190

    • SHA256

      1e5979b249c10d72a89ea37e4a519b9a4b26544ddb9a458b2631ebd4d47655b9

    • SHA512

      1c0a9b69fb8ee72554d9f16c5e45a8bd1fbf2836b7184498e63e46332822c8c0aab9f44a703a9e389a2ee16590db48950042ebda07a69a471e19c985a54eba3f

    • SSDEEP

      1536:zuxAI7bH0oZ2pu4dOEqXWLJuQH42iL5KNWLqlOTIr7qeZ/nCChp8t3435Yhf0OAh:o352/1qXmJLvNWLql7F9ylYYx2h

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks