General

  • Target

    JaffaCakes118_c7f8e1955a3787c90a3556ae14052f72

  • Size

    31KB

  • Sample

    250109-phe8ts1rbm

  • MD5

    c7f8e1955a3787c90a3556ae14052f72

  • SHA1

    d00c9189d6ee235071b732a1068c5419eb9e6ad4

  • SHA256

    ae1383eb4d9bdf82e292bb96095fb8e46ffe89064c9b1da69a75cc9489123b13

  • SHA512

    bdf289ecf647b4b9abb2f3a19ad97a88f1090087e92d468e235c5447f58b678eff11fad4c3406c9cbea129fbb96cab852d9aad07b931e5a436af0cb74ea20310

  • SSDEEP

    768:T98p5d5rLmzxBuJJKye8nu4LPv67QmIDUu0ti78j:SvKO+4jwQVkNj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Hack

C2

127.0.0.1:4444

Mutex

95eba3b7e91ae89ec0605b1877e931a7

Attributes
  • reg_key

    95eba3b7e91ae89ec0605b1877e931a7

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      JaffaCakes118_c7f8e1955a3787c90a3556ae14052f72

    • Size

      31KB

    • MD5

      c7f8e1955a3787c90a3556ae14052f72

    • SHA1

      d00c9189d6ee235071b732a1068c5419eb9e6ad4

    • SHA256

      ae1383eb4d9bdf82e292bb96095fb8e46ffe89064c9b1da69a75cc9489123b13

    • SHA512

      bdf289ecf647b4b9abb2f3a19ad97a88f1090087e92d468e235c5447f58b678eff11fad4c3406c9cbea129fbb96cab852d9aad07b931e5a436af0cb74ea20310

    • SSDEEP

      768:T98p5d5rLmzxBuJJKye8nu4LPv67QmIDUu0ti78j:SvKO+4jwQVkNj

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks