General

  • Target

    JaffaCakes118_ada9c979917eb4e33c2e53eaa3ebc65d

  • Size

    91KB

  • Sample

    250105-sy5p7szpfr

  • MD5

    ada9c979917eb4e33c2e53eaa3ebc65d

  • SHA1

    f5ffc08d32353aecdf6f3479a16030ea45b0b144

  • SHA256

    eac8c07d08dd5e4598473f5f40ea65b3ea40b0d12b2e0100d7db3d5023301a35

  • SHA512

    159e563eb2a649f74f49dbd210b277f0e645922394a3c8261111066ca722fa10bb1b05eec9577869f281dae253f9811ab03dba6bf348b2ce82b5c8e744995dc2

  • SSDEEP

    1536:ZzUWz0ZdvnE8Yn3KKEkoOh8kszZ7s1i+uWZkHAoXQr98ydOyiZbZbLXOsbelwg8r:VUWQnn63ayzMtYaEJ1a

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

c8648e40560227430151a27997c057ca

Attributes
  • reg_key

    c8648e40560227430151a27997c057ca

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_ada9c979917eb4e33c2e53eaa3ebc65d

    • Size

      91KB

    • MD5

      ada9c979917eb4e33c2e53eaa3ebc65d

    • SHA1

      f5ffc08d32353aecdf6f3479a16030ea45b0b144

    • SHA256

      eac8c07d08dd5e4598473f5f40ea65b3ea40b0d12b2e0100d7db3d5023301a35

    • SHA512

      159e563eb2a649f74f49dbd210b277f0e645922394a3c8261111066ca722fa10bb1b05eec9577869f281dae253f9811ab03dba6bf348b2ce82b5c8e744995dc2

    • SSDEEP

      1536:ZzUWz0ZdvnE8Yn3KKEkoOh8kszZ7s1i+uWZkHAoXQr98ydOyiZbZbLXOsbelwg8r:VUWQnn63ayzMtYaEJ1a

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks