General

  • Target

    JaffaCakes118_032330d9cfb02c726457b122d57696b6

  • Size

    90KB

  • Sample

    250106-af5ndazlaz

  • MD5

    032330d9cfb02c726457b122d57696b6

  • SHA1

    07549a13b9d8764d366bad9639226f5dab558f6f

  • SHA256

    f6f920bbf88b3a250354bc12ee568f2643e6fe7c5aecb01f14e17ae27b1f3808

  • SHA512

    67f5809a328443df58f674fa382e8a4916a0dde65dcaa13180ba02625528a652ea0d285293b319f02fec94a9e3263ba2cb0d5126e5ff2584f5c650acb0667e7f

  • SSDEEP

    1536:G4vU6liMCyyzLLD3plFUljOzbKH7apWeCRrb2r:VK9LD5Cj7HGMt2r

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

jamalnajjar123.ddns.net:1177

Mutex

f5aa1406a7e0e081de9e13df98df5d5f

Attributes
  • reg_key

    f5aa1406a7e0e081de9e13df98df5d5f

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_032330d9cfb02c726457b122d57696b6

    • Size

      90KB

    • MD5

      032330d9cfb02c726457b122d57696b6

    • SHA1

      07549a13b9d8764d366bad9639226f5dab558f6f

    • SHA256

      f6f920bbf88b3a250354bc12ee568f2643e6fe7c5aecb01f14e17ae27b1f3808

    • SHA512

      67f5809a328443df58f674fa382e8a4916a0dde65dcaa13180ba02625528a652ea0d285293b319f02fec94a9e3263ba2cb0d5126e5ff2584f5c650acb0667e7f

    • SSDEEP

      1536:G4vU6liMCyyzLLD3plFUljOzbKH7apWeCRrb2r:VK9LD5Cj7HGMt2r

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks