General

  • Target

    JaffaCakes118_7b912ccaeb5e4c043797afca4ed14b20

  • Size

    22KB

  • Sample

    250104-y23b5svqhv

  • MD5

    7b912ccaeb5e4c043797afca4ed14b20

  • SHA1

    e3ac99824f035604e8baebaf8c73f500b85509f9

  • SHA256

    e5c293280491b39aa18a9dd92af383eafa7f560063900dcd75548be915334eb8

  • SHA512

    2c0564144488a6cbd314e0e53ad8c06683736c1f8e2cb64637d56507fb55acd6cc2489f657764b1908749058cf92846bdc58399af6ae46292270951e9f437be7

  • SSDEEP

    384:QluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZyLd:fOmhtIiRpcnuvZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

ayouxi2014.no-ip.biz:1177

Mutex

14daddca2f3010e796a6e67bcc362cca

Attributes
  • reg_key

    14daddca2f3010e796a6e67bcc362cca

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_7b912ccaeb5e4c043797afca4ed14b20

    • Size

      22KB

    • MD5

      7b912ccaeb5e4c043797afca4ed14b20

    • SHA1

      e3ac99824f035604e8baebaf8c73f500b85509f9

    • SHA256

      e5c293280491b39aa18a9dd92af383eafa7f560063900dcd75548be915334eb8

    • SHA512

      2c0564144488a6cbd314e0e53ad8c06683736c1f8e2cb64637d56507fb55acd6cc2489f657764b1908749058cf92846bdc58399af6ae46292270951e9f437be7

    • SSDEEP

      384:QluBPiZCMfdfSJrQbsLRGSIxYVL46pg/i8BD9BmRvR6JZlbw8hqIusZzZyLd:fOmhtIiRpcnuvZ

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks