General

  • Target

    e82f6a62cd96530dbd268d7436fc805d_JaffaCakes118

  • Size

    43KB

  • Sample

    240918-db9cjsyfle

  • MD5

    e82f6a62cd96530dbd268d7436fc805d

  • SHA1

    e6369abc02dbd202aa620834b56dcd61f3e2ca85

  • SHA256

    e1723859d029a12cfed1b485d6733623f422028d816bbdc02cf50d24671c1902

  • SHA512

    54e87068184a48c18ded1a999781e4f89703317010db9d7b8973f5e5c139d0017363e40e52b6e8001eca911ca845d74cddf3b0cb7d158dd2909052a7ab767cc0

  • SSDEEP

    384:nZyrABS0lwZmoy7utsMuMEhx+DEaXzoIij+ZsNO3PlpJKkkjh/TzF7pWnu/greTn:ZDFGol7As7KDzuXQ/or/+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:7777

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      e82f6a62cd96530dbd268d7436fc805d_JaffaCakes118

    • Size

      43KB

    • MD5

      e82f6a62cd96530dbd268d7436fc805d

    • SHA1

      e6369abc02dbd202aa620834b56dcd61f3e2ca85

    • SHA256

      e1723859d029a12cfed1b485d6733623f422028d816bbdc02cf50d24671c1902

    • SHA512

      54e87068184a48c18ded1a999781e4f89703317010db9d7b8973f5e5c139d0017363e40e52b6e8001eca911ca845d74cddf3b0cb7d158dd2909052a7ab767cc0

    • SSDEEP

      384:nZyrABS0lwZmoy7utsMuMEhx+DEaXzoIij+ZsNO3PlpJKkkjh/TzF7pWnu/greTn:ZDFGol7As7KDzuXQ/or/+L

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks