General

  • Target

    593b3910c7e97e6d426e6334f94a4ba1_JaffaCakes118

  • Size

    58KB

  • Sample

    240519-h9rmlsge48

  • MD5

    593b3910c7e97e6d426e6334f94a4ba1

  • SHA1

    5a965364feb9ffa80fbacde302a7d85e835d2749

  • SHA256

    ed72d5b85be09ea8d6da3f34c867224f996306e76732026fa30d45c6e9c83f46

  • SHA512

    efc0581a3a82137f9763fa785ef9df3cdae54a99bd884c03b05e087816dd0e5eb16f4361292508ee59e3c596887e44063737a8fc09f99f79e5eaee4e27a107be

  • SSDEEP

    1536:IKYQ3VQByoCI9sVc1lFODeQXYZoIQkKhlW83:vF3VkyoDsC/FODjIQkKq83

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

تم الاختراق من قبل دكتور الغربية #

C2

Dr187.ddns.net:999

Mutex

59e66e4fd01ed7a53bb65713760bdb7d

Attributes
  • reg_key

    59e66e4fd01ed7a53bb65713760bdb7d

  • splitter

    |'|'|

Targets

    • Target

      593b3910c7e97e6d426e6334f94a4ba1_JaffaCakes118

    • Size

      58KB

    • MD5

      593b3910c7e97e6d426e6334f94a4ba1

    • SHA1

      5a965364feb9ffa80fbacde302a7d85e835d2749

    • SHA256

      ed72d5b85be09ea8d6da3f34c867224f996306e76732026fa30d45c6e9c83f46

    • SHA512

      efc0581a3a82137f9763fa785ef9df3cdae54a99bd884c03b05e087816dd0e5eb16f4361292508ee59e3c596887e44063737a8fc09f99f79e5eaee4e27a107be

    • SSDEEP

      1536:IKYQ3VQByoCI9sVc1lFODeQXYZoIQkKhlW83:vF3VkyoDsC/FODjIQkKq83

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks