General

  • Target

    JaffaCakes118_9e35ed09d72c4f30704f9a595755846e

  • Size

    120KB

  • Sample

    250105-mph7ys1qdz

  • MD5

    9e35ed09d72c4f30704f9a595755846e

  • SHA1

    ae793f91198f294e045d3ebae172a3e49153613d

  • SHA256

    12b6c4aca8af6a0bf15e9278d47a66ef8c7f2772e4b5e863e6bb64289dd47837

  • SHA512

    a62d55cd6d124ead3136b938af63d5eaa97d9eccc2a184357523d29eb1e5405346192d5541d419a6fe6842d9ef721a11d3da981c46608ada382ddd02c09fd502

  • SSDEEP

    3072:3Jki7jvtWHvqueH+08lWwftVLWYTwKeItbgQQ4w4qEV:ainvtCSxolWqLt0Kjbc4DqE

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

sniper7ghost.hopto.org:1177

Mutex

5479dc3981e26ffd0dd086d244c46392

Attributes
  • reg_key

    5479dc3981e26ffd0dd086d244c46392

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_9e35ed09d72c4f30704f9a595755846e

    • Size

      120KB

    • MD5

      9e35ed09d72c4f30704f9a595755846e

    • SHA1

      ae793f91198f294e045d3ebae172a3e49153613d

    • SHA256

      12b6c4aca8af6a0bf15e9278d47a66ef8c7f2772e4b5e863e6bb64289dd47837

    • SHA512

      a62d55cd6d124ead3136b938af63d5eaa97d9eccc2a184357523d29eb1e5405346192d5541d419a6fe6842d9ef721a11d3da981c46608ada382ddd02c09fd502

    • SSDEEP

      3072:3Jki7jvtWHvqueH+08lWwftVLWYTwKeItbgQQ4w4qEV:ainvtCSxolWqLt0Kjbc4DqE

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks