General

  • Target

    JaffaCakes118_e5f54a38b20c838e3428a38c301e79bf

  • Size

    372KB

  • Sample

    250110-q7d8hayjbm

  • MD5

    e5f54a38b20c838e3428a38c301e79bf

  • SHA1

    aaca02dcef730a7e651a1cc833f4dc751d123e1a

  • SHA256

    553a647c1f328a980ca44f45be746902c64710d229fc0a847462fa597b81c5c6

  • SHA512

    7d19831735148f62d73f6227c0cfa9fdda9636cc13432bff8ca149480871e7a838fece056a719f58e50f9c1b7446912cdf686d5cf9f7169112103f2bf8cb5c79

  • SSDEEP

    6144:z2ZkxrKENApfO7Y+IRIwDPP2nUwjXxmv5+LBNwuSSF6IQbF9wfU1DoycWdUCF2YF:zFrVqHpICn0BE5+LNF6IQbF9wfU1Doyr

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

HacKed

C2

savioanon.ddns.net:1177

Mutex

1c03afaed74e953a16100fd22da4e063

Attributes
  • reg_key

    1c03afaed74e953a16100fd22da4e063

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_e5f54a38b20c838e3428a38c301e79bf

    • Size

      372KB

    • MD5

      e5f54a38b20c838e3428a38c301e79bf

    • SHA1

      aaca02dcef730a7e651a1cc833f4dc751d123e1a

    • SHA256

      553a647c1f328a980ca44f45be746902c64710d229fc0a847462fa597b81c5c6

    • SHA512

      7d19831735148f62d73f6227c0cfa9fdda9636cc13432bff8ca149480871e7a838fece056a719f58e50f9c1b7446912cdf686d5cf9f7169112103f2bf8cb5c79

    • SSDEEP

      6144:z2ZkxrKENApfO7Y+IRIwDPP2nUwjXxmv5+LBNwuSSF6IQbF9wfU1DoycWdUCF2YF:zFrVqHpICn0BE5+LNF6IQbF9wfU1Doyr

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks