General

  • Target

    JaffaCakes118_c7f335d3bc251af6b5a899fd7b1e436b

  • Size

    156KB

  • Sample

    250109-pgqyyazkbx

  • MD5

    c7f335d3bc251af6b5a899fd7b1e436b

  • SHA1

    0cd0ca9b5919d4d67f3204d15a717d91b1bf80d0

  • SHA256

    aa565d4f97c0888211383260a289dc1f14d73ed8926dd7ae876c2eb4a9d4ac4b

  • SHA512

    f9547507389f6db3c8b4378574ca388a21a38474c0dcacd62e96454169d58c112af84d1d0f0cab849c2f7c8c0ba77ba81960ff192c6563b11cbc9ae5980756c5

  • SSDEEP

    3072:XCtB0x06xmjs7e2QTeJ6VF+Ycp4wEkkD3rc4naoAkNFM3odi0GA:Sj

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

Vitima

C2

downhacking.duckdns.org:1177

Mutex

0d39e4190d68272f174cf71722404520

Attributes
  • reg_key

    0d39e4190d68272f174cf71722404520

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_c7f335d3bc251af6b5a899fd7b1e436b

    • Size

      156KB

    • MD5

      c7f335d3bc251af6b5a899fd7b1e436b

    • SHA1

      0cd0ca9b5919d4d67f3204d15a717d91b1bf80d0

    • SHA256

      aa565d4f97c0888211383260a289dc1f14d73ed8926dd7ae876c2eb4a9d4ac4b

    • SHA512

      f9547507389f6db3c8b4378574ca388a21a38474c0dcacd62e96454169d58c112af84d1d0f0cab849c2f7c8c0ba77ba81960ff192c6563b11cbc9ae5980756c5

    • SSDEEP

      3072:XCtB0x06xmjs7e2QTeJ6VF+Ycp4wEkkD3rc4naoAkNFM3odi0GA:Sj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks