General

  • Target

    6cb81f7937ae2fc220f4c6ed62851d18_JaffaCakes118

  • Size

    210KB

  • Sample

    240524-aa4h5aea8t

  • MD5

    6cb81f7937ae2fc220f4c6ed62851d18

  • SHA1

    518ee5bcb00c32dbbee072bc0bb8be318d091ea9

  • SHA256

    544e3c1bb46608715f4e47e97fe7d867332e63c1a6ea532f839423cf4fe9a040

  • SHA512

    7207be8f2d5afc085195537c71a430e55494d34d8d87192a6577ea5cced5dc8a1582ef46c0e95c713b138be6c58b3fdf7ddf399e5aa50a9287ff8eaecd8fd495

  • SSDEEP

    1536:skzM+KDMILNf4yqYN1Qz2yfrdMSgCV1JToxlZHnkhpUkPJrYRKyWWg9yPg:bzM+KDM2qYN1QRraSgCFulZHE1YRZ6j

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

victim

C2

1026ef32.ddns.net:5353

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      6cb81f7937ae2fc220f4c6ed62851d18_JaffaCakes118

    • Size

      210KB

    • MD5

      6cb81f7937ae2fc220f4c6ed62851d18

    • SHA1

      518ee5bcb00c32dbbee072bc0bb8be318d091ea9

    • SHA256

      544e3c1bb46608715f4e47e97fe7d867332e63c1a6ea532f839423cf4fe9a040

    • SHA512

      7207be8f2d5afc085195537c71a430e55494d34d8d87192a6577ea5cced5dc8a1582ef46c0e95c713b138be6c58b3fdf7ddf399e5aa50a9287ff8eaecd8fd495

    • SSDEEP

      1536:skzM+KDMILNf4yqYN1Qz2yfrdMSgCV1JToxlZHnkhpUkPJrYRKyWWg9yPg:bzM+KDM2qYN1QRraSgCFulZHE1YRZ6j

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks