General

  • Target

    81c9eff3fbe72b983ab2c52dd7183fe6_JaffaCakes118

  • Size

    1.4MB

  • Sample

    240801-1bs2wswhkr

  • MD5

    81c9eff3fbe72b983ab2c52dd7183fe6

  • SHA1

    7e518445497609960ff3ce0c79cd01682295acfc

  • SHA256

    6821de637a9c0a7388c6b9ee34ca8843fd259b9b027e6af27615d122e7e77c11

  • SHA512

    758e0f7a6d8ffe354a4af33cc7b05194a39d448ab9786cd2b7fb6ef8921a9d77e471c5662b43d4b60d60843389f8e55ac55f0e9d3ba754a511507d45aefc46ef

  • SSDEEP

    24576:x74qXU1nEcmn2YlaIbg03q7mRawAiiX8H3E21zKbt51:x77k+n2Y8Ib27mRaLVqEqGt5

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

MOO SALAH

C2

milla.publicvm.com:1177

Mutex

b9abd535ae166ceac71e91d5d5dc48be

Attributes
  • reg_key

    b9abd535ae166ceac71e91d5d5dc48be

  • splitter

    |'|'|

Targets

    • Target

      81c9eff3fbe72b983ab2c52dd7183fe6_JaffaCakes118

    • Size

      1.4MB

    • MD5

      81c9eff3fbe72b983ab2c52dd7183fe6

    • SHA1

      7e518445497609960ff3ce0c79cd01682295acfc

    • SHA256

      6821de637a9c0a7388c6b9ee34ca8843fd259b9b027e6af27615d122e7e77c11

    • SHA512

      758e0f7a6d8ffe354a4af33cc7b05194a39d448ab9786cd2b7fb6ef8921a9d77e471c5662b43d4b60d60843389f8e55ac55f0e9d3ba754a511507d45aefc46ef

    • SSDEEP

      24576:x74qXU1nEcmn2YlaIbg03q7mRawAiiX8H3E21zKbt51:x77k+n2Y8Ib27mRaLVqEqGt5

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks