General

  • Target

    JaffaCakes118_bdba5dd4239130c024b30b90977aff8e

  • Size

    68KB

  • Sample

    250109-e8sxhaymc1

  • MD5

    bdba5dd4239130c024b30b90977aff8e

  • SHA1

    697f1c88827eedeffc06053d835f04fdeaf78270

  • SHA256

    815c8c4904fecee31ddb03098bb1278f626c4aac1b02c72d8d9a652dce79c201

  • SHA512

    58f50e8a1fd67820977eefb5aa198a24d4408505b9091f1f405f534818adeda4c8c25ecae9cd82f03c7539148f650ffb4767d7d29f2e5fae17cfab05d30befcb

  • SSDEEP

    1536:TRgVbkS1ZiP4ucT3eJG53G73mxdvd2sfE38m:T6VbdOP4RT32GhNv4ss3R

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

savioanon.ddns.net:1177

Mutex

1c03afaed74e953a16100fd22da4e063

Attributes
  • reg_key

    1c03afaed74e953a16100fd22da4e063

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_bdba5dd4239130c024b30b90977aff8e

    • Size

      68KB

    • MD5

      bdba5dd4239130c024b30b90977aff8e

    • SHA1

      697f1c88827eedeffc06053d835f04fdeaf78270

    • SHA256

      815c8c4904fecee31ddb03098bb1278f626c4aac1b02c72d8d9a652dce79c201

    • SHA512

      58f50e8a1fd67820977eefb5aa198a24d4408505b9091f1f405f534818adeda4c8c25ecae9cd82f03c7539148f650ffb4767d7d29f2e5fae17cfab05d30befcb

    • SSDEEP

      1536:TRgVbkS1ZiP4ucT3eJG53G73mxdvd2sfE38m:T6VbdOP4RT32GhNv4ss3R

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks