General

  • Target

    db8b010e3c70010099e88f2ab2d139f1_JaffaCakes118

  • Size

    262KB

  • Sample

    240912-bewvhstala

  • MD5

    db8b010e3c70010099e88f2ab2d139f1

  • SHA1

    8e1147620a927d13856949d2e17d132a6f636860

  • SHA256

    ec44fadc9e39f97405fe11d7ed6e5841f98ece330504b7d837ab10176653e497

  • SHA512

    5f4477d132118f7b457855dabdec461f2921559428e42bf60af409fcf411c983d1bdb0c693ce7b2c9aa6d27e777c8f805dfcedfbf358ebee0027b882aac1da03

  • SSDEEP

    6144:6GlvnDFO5Wt3DeYcTJF6BcKNIO97dmqSK8pgDRqq1NGF:6CvnDFGu0TJF6BbNIO9ht1e

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

تم الاختراق من قبل دكتور الغربية #

C2

Dr187.ddns.net:4444

Mutex

59e66e4fd01ed7a53bb65713760bdb7d

Attributes
  • reg_key

    59e66e4fd01ed7a53bb65713760bdb7d

  • splitter

    |'|'|

Targets

    • Target

      db8b010e3c70010099e88f2ab2d139f1_JaffaCakes118

    • Size

      262KB

    • MD5

      db8b010e3c70010099e88f2ab2d139f1

    • SHA1

      8e1147620a927d13856949d2e17d132a6f636860

    • SHA256

      ec44fadc9e39f97405fe11d7ed6e5841f98ece330504b7d837ab10176653e497

    • SHA512

      5f4477d132118f7b457855dabdec461f2921559428e42bf60af409fcf411c983d1bdb0c693ce7b2c9aa6d27e777c8f805dfcedfbf358ebee0027b882aac1da03

    • SSDEEP

      6144:6GlvnDFO5Wt3DeYcTJF6BcKNIO97dmqSK8pgDRqq1NGF:6CvnDFGu0TJF6BbNIO9ht1e

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks