General

  • Target

    c5e52f77107a568815714b35f88edc2e_JaffaCakes118

  • Size

    23KB

  • Sample

    240827-2yqeyswbkb

  • MD5

    c5e52f77107a568815714b35f88edc2e

  • SHA1

    8c62ebd988215c3427d2bfb33bf933cf9b85aa4b

  • SHA256

    17131a50733a1f1adf11fe99b52ec18c8ce4988b95a6aa9541879741ec2aa918

  • SHA512

    e02b7ffbcf6a6375f9c87275108b7ebd8c7d69fbb23bd3d2dc8bf55edd41d2b8d0a1719ae0f7a6bd29dc3c582afc225f8004d5248d01a9e9a3b08a79cb6f8b78

  • SSDEEP

    384:zQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZCd:k5yBVd7RpcnuZ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

emad1987.myq-see.com:3973

Mutex

5380bd110381d2960055cc04618dfc86

Attributes
  • reg_key

    5380bd110381d2960055cc04618dfc86

  • splitter

    |'|'|

Targets

    • Target

      c5e52f77107a568815714b35f88edc2e_JaffaCakes118

    • Size

      23KB

    • MD5

      c5e52f77107a568815714b35f88edc2e

    • SHA1

      8c62ebd988215c3427d2bfb33bf933cf9b85aa4b

    • SHA256

      17131a50733a1f1adf11fe99b52ec18c8ce4988b95a6aa9541879741ec2aa918

    • SHA512

      e02b7ffbcf6a6375f9c87275108b7ebd8c7d69fbb23bd3d2dc8bf55edd41d2b8d0a1719ae0f7a6bd29dc3c582afc225f8004d5248d01a9e9a3b08a79cb6f8b78

    • SSDEEP

      384:zQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZCd:k5yBVd7RpcnuZ

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks