General

  • Target

    JaffaCakes118_2104a7a18b60863b1d73b3bb082ab620

  • Size

    296KB

  • Sample

    250106-nmd1wsxnhn

  • MD5

    2104a7a18b60863b1d73b3bb082ab620

  • SHA1

    45c746cc708635f239a9b8cf01aec6b186192bc4

  • SHA256

    ddebf2f47bcc673d1981784382b9e590f8347f2b4d2d16ac5ed5863038010334

  • SHA512

    17008f2006a7176a38df0e482b2131aac4c4b39ca6b56ae88c2d2a3c4d21fb27df4fe0c107447885d40635921e343eb47d319a9e7164a512f215cee9cd1a627e

  • SSDEEP

    768:+h6X/EWNG6+DG9PG1INeBU09m4ukw6nbi/bUibwp4JDeDYISywilKFtf5vLAY1Rs:+hoEWHNeBU09kHsi/X7N6aRM

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

scammer

C2

oxy01.linkpc.net:1177

Mutex

08f4dc96bbb7af09d1a37fe35c75a42f

Attributes
  • reg_key

    08f4dc96bbb7af09d1a37fe35c75a42f

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_2104a7a18b60863b1d73b3bb082ab620

    • Size

      296KB

    • MD5

      2104a7a18b60863b1d73b3bb082ab620

    • SHA1

      45c746cc708635f239a9b8cf01aec6b186192bc4

    • SHA256

      ddebf2f47bcc673d1981784382b9e590f8347f2b4d2d16ac5ed5863038010334

    • SHA512

      17008f2006a7176a38df0e482b2131aac4c4b39ca6b56ae88c2d2a3c4d21fb27df4fe0c107447885d40635921e343eb47d319a9e7164a512f215cee9cd1a627e

    • SSDEEP

      768:+h6X/EWNG6+DG9PG1INeBU09m4ukw6nbi/bUibwp4JDeDYISywilKFtf5vLAY1Rs:+hoEWHNeBU09kHsi/X7N6aRM

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks