General

  • Target

    JaffaCakes118_c8582d89aaaa2c040f4cefbf8e0d77fb

  • Size

    103KB

  • Sample

    250109-pv4ryszmhv

  • MD5

    c8582d89aaaa2c040f4cefbf8e0d77fb

  • SHA1

    b197e09bd6bfe45effd5e9c98787f0648db7f41e

  • SHA256

    ac50a856dcf3ecfee996f54f64ec09e3a6edb7b988b8bb159c33a6a19193d1ff

  • SHA512

    00081486f5687173d03792430bf1b41e1ef9fa5a49ebc820a549e1bd4a3925f8aaf5abb7646ac46b31617aee996fa85cdcea8b06782bed250c563db46cd3d688

  • SSDEEP

    1536:zu9ckBKj047HNs17gJEnRrRdy8KYmLQNojh+qoeWyHUiswADVXss25qB3bxVRsNB:2ckBKVmpBL9ms6A6TjBgPXrs

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

oxy01.linkpc.net:1177

Mutex

08f4dc96bbb7af09d1a37fe35c75a42f

Attributes
  • reg_key

    08f4dc96bbb7af09d1a37fe35c75a42f

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_c8582d89aaaa2c040f4cefbf8e0d77fb

    • Size

      103KB

    • MD5

      c8582d89aaaa2c040f4cefbf8e0d77fb

    • SHA1

      b197e09bd6bfe45effd5e9c98787f0648db7f41e

    • SHA256

      ac50a856dcf3ecfee996f54f64ec09e3a6edb7b988b8bb159c33a6a19193d1ff

    • SHA512

      00081486f5687173d03792430bf1b41e1ef9fa5a49ebc820a549e1bd4a3925f8aaf5abb7646ac46b31617aee996fa85cdcea8b06782bed250c563db46cd3d688

    • SSDEEP

      1536:zu9ckBKj047HNs17gJEnRrRdy8KYmLQNojh+qoeWyHUiswADVXss25qB3bxVRsNB:2ckBKVmpBL9ms6A6TjBgPXrs

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks