General

  • Target

    JaffaCakes118_6e69dc66ce45e54c228e317dd8675854

  • Size

    327KB

  • Sample

    250107-vczcea1pck

  • MD5

    6e69dc66ce45e54c228e317dd8675854

  • SHA1

    cea962890c7e256ac8181aff339f59970008a0c0

  • SHA256

    cb669fb7866317185b8524b974bc3fafa65336274c142d406b452b2a5b8ff564

  • SHA512

    ab990eaf5d5256e9c3bc6259b84e26132c369e23624ee504b400db5fc4887837f9e81705a720f11e47eddc26d052d69c9ba42db4abae9cb45e747586d7d49f10

  • SSDEEP

    6144:t2UL2i9F/NTutkrLgGDLRPfr2UL2i9F/NTutkrLgGDLRPft:t2sF/N9DFPfr2sF/N9DFPft

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

gejeg82586-50390.portmap.host:50390

Mutex

6aee5e7ffe1fb21cf7de6841a19c68c2

6aee5e7ffe1fb21cf7de6841a19c68c2

Attributes
  • reg_key

    6aee5e7ffe1fb21cf7de6841a19c68c2

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_6e69dc66ce45e54c228e317dd8675854

    • Size

      327KB

    • MD5

      6e69dc66ce45e54c228e317dd8675854

    • SHA1

      cea962890c7e256ac8181aff339f59970008a0c0

    • SHA256

      cb669fb7866317185b8524b974bc3fafa65336274c142d406b452b2a5b8ff564

    • SHA512

      ab990eaf5d5256e9c3bc6259b84e26132c369e23624ee504b400db5fc4887837f9e81705a720f11e47eddc26d052d69c9ba42db4abae9cb45e747586d7d49f10

    • SSDEEP

      6144:t2UL2i9F/NTutkrLgGDLRPfr2UL2i9F/NTutkrLgGDLRPft:t2sF/N9DFPfr2sF/N9DFPft

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks