General

  • Target

    e52d085cfb93f4a63db0db37c6b820e5_JaffaCakes118

  • Size

    23KB

  • Sample

    240916-t6lsqsyajh

  • MD5

    e52d085cfb93f4a63db0db37c6b820e5

  • SHA1

    26cf79745aaea2990e20662d7e33b792ff83c9b7

  • SHA256

    08f2a0040b251bc20f315b65aa9528d22573c8d51861d44aebf903aeb1da0136

  • SHA512

    e43045ced2348d5de02c49d5a59033633626ff824d5b98d3a6691abb8624fc2e6efe7c7480decb830ea3bf1f30704c0407e1cb856b6de980d7a5bd1b3b7887b3

  • SSDEEP

    384:1Ls2aUrue9Bx0RPIxHVSul0M/GrUdw6jgFIqZZj1mRvR6JZlbw8hqIusZzZxa:1gQ/ok1lzRpcnub

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Elyess is a bitch

C2

remygeek.ddns.net:1177

Mutex

66b4020ce8224481b1b0af5de92681ff

Attributes
  • reg_key

    66b4020ce8224481b1b0af5de92681ff

  • splitter

    |'|'|

Targets

    • Target

      e52d085cfb93f4a63db0db37c6b820e5_JaffaCakes118

    • Size

      23KB

    • MD5

      e52d085cfb93f4a63db0db37c6b820e5

    • SHA1

      26cf79745aaea2990e20662d7e33b792ff83c9b7

    • SHA256

      08f2a0040b251bc20f315b65aa9528d22573c8d51861d44aebf903aeb1da0136

    • SHA512

      e43045ced2348d5de02c49d5a59033633626ff824d5b98d3a6691abb8624fc2e6efe7c7480decb830ea3bf1f30704c0407e1cb856b6de980d7a5bd1b3b7887b3

    • SSDEEP

      384:1Ls2aUrue9Bx0RPIxHVSul0M/GrUdw6jgFIqZZj1mRvR6JZlbw8hqIusZzZxa:1gQ/ok1lzRpcnub

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks