General

  • Target

    JaffaCakes118_7e5a8ff9a87eab057b76582b49018df9

  • Size

    117KB

  • Sample

    250107-27hfpsvpap

  • MD5

    7e5a8ff9a87eab057b76582b49018df9

  • SHA1

    06ca8560eb9c700bb420abaa33f076c808155822

  • SHA256

    aaaebe4723df9ffde21f0e0066105a74377f0612282d508f3ae0e49b280d68fe

  • SHA512

    98e6e2e41e2c92beb6aa406bd348267209caed88b4683c3ae25d48c2ad104a68fb3ec955eb03554a6f7641da447a0e524a37ca74a3ae852047f8569ff07e80d3

  • SSDEEP

    3072:7E8AHzBgZC5gRFYU2zmMcVinx7754KmUa6Q:uyggR+U2HoiV14KmU

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

mx

C2

209.200.39.186:1172

Mutex

7c5ab2d4b3ee0e1b3e9cf876e75dff1f

Attributes
  • reg_key

    7c5ab2d4b3ee0e1b3e9cf876e75dff1f

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_7e5a8ff9a87eab057b76582b49018df9

    • Size

      117KB

    • MD5

      7e5a8ff9a87eab057b76582b49018df9

    • SHA1

      06ca8560eb9c700bb420abaa33f076c808155822

    • SHA256

      aaaebe4723df9ffde21f0e0066105a74377f0612282d508f3ae0e49b280d68fe

    • SHA512

      98e6e2e41e2c92beb6aa406bd348267209caed88b4683c3ae25d48c2ad104a68fb3ec955eb03554a6f7641da447a0e524a37ca74a3ae852047f8569ff07e80d3

    • SSDEEP

      3072:7E8AHzBgZC5gRFYU2zmMcVinx7754KmUa6Q:uyggR+U2HoiV14KmU

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks