General

  • Target

    1d436a4cc5e5cfb02d87dea4ff79e4b0_JaffaCakes118

  • Size

    210KB

  • Sample

    240506-td1q7ahb6v

  • MD5

    1d436a4cc5e5cfb02d87dea4ff79e4b0

  • SHA1

    40f5564c91050fa44ea31d87b4bedca80638d1d8

  • SHA256

    cb721eeebde355b68ec90050889b2427b67150b08f89e790328505f13d7956c3

  • SHA512

    57359b96e319460c03a41754238a4f3904978f12686a474ef0b5c4ec4bcfc9a05874f201799306232a6057c3429e82fef8bb0aa383e4f624bd6b288b98026b84

  • SSDEEP

    1536:yj6wz8pFu0dcxccjc9Gye5gLO9vEWWG5nukXegDkHEBxhcV91BdqcXpgfKiNZK1p:y7V77qSeoVUl7106LwdiB

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

victim

C2

shooey.ddns.net:5353

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      1d436a4cc5e5cfb02d87dea4ff79e4b0_JaffaCakes118

    • Size

      210KB

    • MD5

      1d436a4cc5e5cfb02d87dea4ff79e4b0

    • SHA1

      40f5564c91050fa44ea31d87b4bedca80638d1d8

    • SHA256

      cb721eeebde355b68ec90050889b2427b67150b08f89e790328505f13d7956c3

    • SHA512

      57359b96e319460c03a41754238a4f3904978f12686a474ef0b5c4ec4bcfc9a05874f201799306232a6057c3429e82fef8bb0aa383e4f624bd6b288b98026b84

    • SSDEEP

      1536:yj6wz8pFu0dcxccjc9Gye5gLO9vEWWG5nukXegDkHEBxhcV91BdqcXpgfKiNZK1p:y7V77qSeoVUl7106LwdiB

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks