General

  • Target

    JaffaCakes118_1d8e7ecc9a85f7ccec3db024776bc04d

  • Size

    6.9MB

  • Sample

    250106-l7274stnet

  • MD5

    1d8e7ecc9a85f7ccec3db024776bc04d

  • SHA1

    47f0d3c6955b43b68d94d03d06a3a8ef1074ba91

  • SHA256

    f24ff61cb7aad7ddca71602ad20d293290c63e5affb8efe5b9096fafdf759106

  • SHA512

    d9dae142bfbf705122f9779b675b1da2451f33652244cd176328fa1d733d174823178693c05f9f28c52863b6a8334178b32be174a1cb3e04ac9d0c78a9b3fc8e

  • SSDEEP

    196608:17IDnutomkDjyDqvee1n/0FR9mnpdYaPp+v33SDHirA0ScmceqICt4KpBVbvT:17IDnutomkDjyDqvee1n/0FR9mnpdYag

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Test1

C2

127.0.0.1:1245

Mutex

8315d23300ad8a8da4ba0ac26bd93afc

Attributes
  • reg_key

    8315d23300ad8a8da4ba0ac26bd93afc

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_1d8e7ecc9a85f7ccec3db024776bc04d

    • Size

      6.9MB

    • MD5

      1d8e7ecc9a85f7ccec3db024776bc04d

    • SHA1

      47f0d3c6955b43b68d94d03d06a3a8ef1074ba91

    • SHA256

      f24ff61cb7aad7ddca71602ad20d293290c63e5affb8efe5b9096fafdf759106

    • SHA512

      d9dae142bfbf705122f9779b675b1da2451f33652244cd176328fa1d733d174823178693c05f9f28c52863b6a8334178b32be174a1cb3e04ac9d0c78a9b3fc8e

    • SSDEEP

      196608:17IDnutomkDjyDqvee1n/0FR9mnpdYaPp+v33SDHirA0ScmceqICt4KpBVbvT:17IDnutomkDjyDqvee1n/0FR9mnpdYag

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks