General

  • Target

    JaffaCakes118_9e6eee535d7b2c2f40c5a5478fa5810d

  • Size

    104KB

  • Sample

    250108-n92eps1pbl

  • MD5

    9e6eee535d7b2c2f40c5a5478fa5810d

  • SHA1

    96514e92d1224ee35317fc69f64f6147c93a870c

  • SHA256

    4ef128a8ae0eb9a7ab045791ddcfd834f173ad5cb98dd51c9cc84fb99f8cbef2

  • SHA512

    b2e0db6af410f07d263d5d448b8a39b9f0b1111cbdc6285a23983edf91e15d2ad27f466abbc78ab6714d61e32ceb7d8edb4db4ecb783400ea34ba22cbe149276

  • SSDEEP

    3072:570QJgokhjJOB5bCRLq2xvwoHmrlNuXQgi2VK:yQJgomGlIq2VfGrbuXJV

Malware Config

Extracted

Family

njrat

Version

v2.0

Botnet

HacKed

C2

198.54.133.75:54893

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Targets

    • Target

      JaffaCakes118_9e6eee535d7b2c2f40c5a5478fa5810d

    • Size

      104KB

    • MD5

      9e6eee535d7b2c2f40c5a5478fa5810d

    • SHA1

      96514e92d1224ee35317fc69f64f6147c93a870c

    • SHA256

      4ef128a8ae0eb9a7ab045791ddcfd834f173ad5cb98dd51c9cc84fb99f8cbef2

    • SHA512

      b2e0db6af410f07d263d5d448b8a39b9f0b1111cbdc6285a23983edf91e15d2ad27f466abbc78ab6714d61e32ceb7d8edb4db4ecb783400ea34ba22cbe149276

    • SSDEEP

      3072:570QJgokhjJOB5bCRLq2xvwoHmrlNuXQgi2VK:yQJgomGlIq2VfGrbuXJV

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks