General

  • Target

    JaffaCakes118_b8774235b5fc45a7e8d05dd76a06dca6

  • Size

    264KB

  • Sample

    250105-xr16navpbl

  • MD5

    b8774235b5fc45a7e8d05dd76a06dca6

  • SHA1

    747f3ba5a954657deb4f5f52e3f5a61413079598

  • SHA256

    a3a08b39f4003aeee721df549a4d500708972482b8eb592510c9fe8c508a01ee

  • SHA512

    d1b7c19816365576c90a72ee0eb5d7fcfe56fb8429d902d25602bb4d3a7e0b4ff8ecc62b6c518958293b1da110ad3639ea8ce906678078b2f1e1eee3349f0996

  • SSDEEP

    3072:E2S3rHoYNjPGAY1zkMlXW/UteD4p6XC0Qo0IynPIDLC2OGVcTRlaSY:xS7oYNjP3crorC

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

NEWHACK

C2

libraries.myvnc.com:1666

Mutex

301b5fcf8ce2fab8868e80b6c1f912fe

Attributes
  • reg_key

    301b5fcf8ce2fab8868e80b6c1f912fe

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_b8774235b5fc45a7e8d05dd76a06dca6

    • Size

      264KB

    • MD5

      b8774235b5fc45a7e8d05dd76a06dca6

    • SHA1

      747f3ba5a954657deb4f5f52e3f5a61413079598

    • SHA256

      a3a08b39f4003aeee721df549a4d500708972482b8eb592510c9fe8c508a01ee

    • SHA512

      d1b7c19816365576c90a72ee0eb5d7fcfe56fb8429d902d25602bb4d3a7e0b4ff8ecc62b6c518958293b1da110ad3639ea8ce906678078b2f1e1eee3349f0996

    • SSDEEP

      3072:E2S3rHoYNjPGAY1zkMlXW/UteD4p6XC0Qo0IynPIDLC2OGVcTRlaSY:xS7oYNjP3crorC

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks