General

  • Target

    e2520e412a29b90a63122c082ab1c9e3_JaffaCakes118

  • Size

    110KB

  • Sample

    240915-m1bbgs1cmk

  • MD5

    e2520e412a29b90a63122c082ab1c9e3

  • SHA1

    ab922828866892d841a428320574c0a096ebe633

  • SHA256

    5f2099be49c3330e21d8c1900f152d56dc382a22bda681815d9d88328a5e0d0a

  • SHA512

    28226aae3323e90adf5d5f7be7cb32210f8e68a0871abc60c144aeee2301251e81ec7ff89d8090a9166eed2ef1941ef895d5cbbf9fc13402a52341cf4acd9aa1

  • SSDEEP

    3072:X4akFwf8baRt1T6c5uI6wJOF9aYdV5REyQ0bYqX:wG+c5cteYVRc

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

تم الاختراق من قبل دكتور الغربية #

C2

Dr187.ddns.net:4444

Mutex

59e66e4fd01ed7a53bb65713760bdb7d

Attributes
  • reg_key

    59e66e4fd01ed7a53bb65713760bdb7d

  • splitter

    |'|'|

Targets

    • Target

      e2520e412a29b90a63122c082ab1c9e3_JaffaCakes118

    • Size

      110KB

    • MD5

      e2520e412a29b90a63122c082ab1c9e3

    • SHA1

      ab922828866892d841a428320574c0a096ebe633

    • SHA256

      5f2099be49c3330e21d8c1900f152d56dc382a22bda681815d9d88328a5e0d0a

    • SHA512

      28226aae3323e90adf5d5f7be7cb32210f8e68a0871abc60c144aeee2301251e81ec7ff89d8090a9166eed2ef1941ef895d5cbbf9fc13402a52341cf4acd9aa1

    • SSDEEP

      3072:X4akFwf8baRt1T6c5uI6wJOF9aYdV5REyQ0bYqX:wG+c5cteYVRc

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks