General

  • Target

    JaffaCakes118_81db08af2e45902dd126c2bb0b2742ec

  • Size

    32KB

  • Sample

    250105-bllccsykej

  • MD5

    81db08af2e45902dd126c2bb0b2742ec

  • SHA1

    3b089636bdbed115573f66e37040272e818243e2

  • SHA256

    813797b7a9acf4262cf567f0cbe09ebd6be5d5c446ebe4fa5c147e7b94bf5ad4

  • SHA512

    97f464e63e907cb47f967cf9a99bffec34163fcb97d34530e6fcaebaac298a6d16a414960bf3aac54bd957c5490b0ec3cbcd6ab6041e53c9c6f998fc3914ee41

  • SSDEEP

    768:lRSDnewcKNVi4wbNF51jT3rFHkKbBgqpMxgP9CKl:P+nM4ivbNFnXrxki34gP9CKl

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

Mutex

6987755f146a62fa584d2a8a43dc9fe3

Attributes
  • reg_key

    6987755f146a62fa584d2a8a43dc9fe3

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_81db08af2e45902dd126c2bb0b2742ec

    • Size

      32KB

    • MD5

      81db08af2e45902dd126c2bb0b2742ec

    • SHA1

      3b089636bdbed115573f66e37040272e818243e2

    • SHA256

      813797b7a9acf4262cf567f0cbe09ebd6be5d5c446ebe4fa5c147e7b94bf5ad4

    • SHA512

      97f464e63e907cb47f967cf9a99bffec34163fcb97d34530e6fcaebaac298a6d16a414960bf3aac54bd957c5490b0ec3cbcd6ab6041e53c9c6f998fc3914ee41

    • SSDEEP

      768:lRSDnewcKNVi4wbNF51jT3rFHkKbBgqpMxgP9CKl:P+nM4ivbNFnXrxki34gP9CKl

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks