General

  • Target

    JaffaCakes118_0f8f1d669887d45a09c73486780bd9a4

  • Size

    130KB

  • Sample

    250106-fjhkxayqar

  • MD5

    0f8f1d669887d45a09c73486780bd9a4

  • SHA1

    402496a5e0be4b62988b5dc45bcb8874d8a237bc

  • SHA256

    f4102eabfbc0a233683bd6d410ab74bc62105880d3d39b3e817d14cb80c17d7c

  • SHA512

    e918c8df47ac1cf16b0d4d5815f073540955f2345581733de8bc4d2386a84af8ad86910690da2f658c16363510e8d42d320b98532f7373d396a273e4e2aad91e

  • SSDEEP

    3072:pCwer7j33ZdbSNO4wmR34hP8naoAk3/zGMi0GD:oF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

kinGs

C2

autosytes.sytes.net:8812

Mutex

c4ce1a3cf5434f82369ee03a55fe27ec

Attributes
  • reg_key

    c4ce1a3cf5434f82369ee03a55fe27ec

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_0f8f1d669887d45a09c73486780bd9a4

    • Size

      130KB

    • MD5

      0f8f1d669887d45a09c73486780bd9a4

    • SHA1

      402496a5e0be4b62988b5dc45bcb8874d8a237bc

    • SHA256

      f4102eabfbc0a233683bd6d410ab74bc62105880d3d39b3e817d14cb80c17d7c

    • SHA512

      e918c8df47ac1cf16b0d4d5815f073540955f2345581733de8bc4d2386a84af8ad86910690da2f658c16363510e8d42d320b98532f7373d396a273e4e2aad91e

    • SSDEEP

      3072:pCwer7j33ZdbSNO4wmR34hP8naoAk3/zGMi0GD:oF

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks