General

  • Target

    JaffaCakes118_01ad9932d1b5b7811c70da720132ad99

  • Size

    116KB

  • Sample

    250511-g2nqbaxns7

  • MD5

    01ad9932d1b5b7811c70da720132ad99

  • SHA1

    80ecf0a78374a17c59e3e1307038e85969a087f4

  • SHA256

    3053d9edf9be37c20205f1ca986c1a003f3e560a0f52d377ebda994fdceadc70

  • SHA512

    32fb71e8fd5eea330e3417e21ef4cdcb82c16bf900416bd5a2c752575ab54d6f65217f263e2dfe0279e37f61adaf7a4cc16b2f49c9e9e37c46cb4148e0397cc0

  • SSDEEP

    1536:ccgAF8IDlvg9XW7NrMdDTsyXyiFOkgSWtJIZuPXNb755jPnx7pFi0:OAF8IDlYUpMdDIyXok5WCuB75JNpFi0

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

fun

C2

iart76.wintelupdate.pw:1400

Mutex

3196c6f39d39d94c23272fbaa6fdfdf3

Attributes
  • reg_key

    3196c6f39d39d94c23272fbaa6fdfdf3

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_01ad9932d1b5b7811c70da720132ad99

    • Size

      116KB

    • MD5

      01ad9932d1b5b7811c70da720132ad99

    • SHA1

      80ecf0a78374a17c59e3e1307038e85969a087f4

    • SHA256

      3053d9edf9be37c20205f1ca986c1a003f3e560a0f52d377ebda994fdceadc70

    • SHA512

      32fb71e8fd5eea330e3417e21ef4cdcb82c16bf900416bd5a2c752575ab54d6f65217f263e2dfe0279e37f61adaf7a4cc16b2f49c9e9e37c46cb4148e0397cc0

    • SSDEEP

      1536:ccgAF8IDlvg9XW7NrMdDTsyXyiFOkgSWtJIZuPXNb755jPnx7pFi0:OAF8IDlYUpMdDIyXok5WCuB75JNpFi0

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »