General

  • Target

    JaffaCakes118_a7f56e74acb142c70bdedbf6ca88a2ab

  • Size

    65KB

  • Sample

    250108-x7zb1azndv

  • MD5

    a7f56e74acb142c70bdedbf6ca88a2ab

  • SHA1

    f3b0f066184417e98e4c9ecd3523a3ee1354b36a

  • SHA256

    0a0982e2e395debb82f0e834a9a5a8a5bb9c3e28ed8d689b07f4ea4f6d6fbe1f

  • SHA512

    bf3f1f445619edb2a1476a46e8874a716e9fd2e46da1818d83084cc1944554655860a384a3f303915d100f3dddc92af0df40de4c06b576c4c9f1d14cfbf3a511

  • SSDEEP

    1536:tYgyythn0smQmXFhaNcSFDx6DBY6dOATmLR1vxl8:SgyyznbmQAhe/Fx2HBTmLDvxl8

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

66.102.1.188:5555

Mutex

da469bc20951884431b00ec6439394f2

Attributes
  • reg_key

    da469bc20951884431b00ec6439394f2

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_a7f56e74acb142c70bdedbf6ca88a2ab

    • Size

      65KB

    • MD5

      a7f56e74acb142c70bdedbf6ca88a2ab

    • SHA1

      f3b0f066184417e98e4c9ecd3523a3ee1354b36a

    • SHA256

      0a0982e2e395debb82f0e834a9a5a8a5bb9c3e28ed8d689b07f4ea4f6d6fbe1f

    • SHA512

      bf3f1f445619edb2a1476a46e8874a716e9fd2e46da1818d83084cc1944554655860a384a3f303915d100f3dddc92af0df40de4c06b576c4c9f1d14cfbf3a511

    • SSDEEP

      1536:tYgyythn0smQmXFhaNcSFDx6DBY6dOATmLR1vxl8:SgyyznbmQAhe/Fx2HBTmLDvxl8

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks