General

  • Target

    e86585e7460f9482eb5db770d8d349c0_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240918-ft54ysvckp

  • MD5

    e86585e7460f9482eb5db770d8d349c0

  • SHA1

    61eee25ecdda15e44cea3eaf19cae4d12fbcc334

  • SHA256

    80bccf93740f4fd46f179f07ac06a68509fc02015f9b04c47aa4c326ed3c46d2

  • SHA512

    030bef5e99b6966ddf0fd7294340ec57caf29e68e9dac6bc27bb335c54a73dd4f616e6d19724e3a513a0606e540f996b560d0e47202ab7190b02bfe36e0a6682

  • SSDEEP

    24576:nbrSjgFh+5p6NWKDpHQ2j2oFcLVMtg/ZHFBocS1l7x/xCJKnYLSx5+YtuMgqu:bGjgIgHQ45c+gY7mJmuMgqu

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

SARA GAMAL

C2

milla.publicvm.com:1177

Mutex

e972659c4a9bda645740113e1c277e40

Attributes
  • reg_key

    e972659c4a9bda645740113e1c277e40

  • splitter

    |'|'|

Targets

    • Target

      e86585e7460f9482eb5db770d8d349c0_JaffaCakes118

    • Size

      1.5MB

    • MD5

      e86585e7460f9482eb5db770d8d349c0

    • SHA1

      61eee25ecdda15e44cea3eaf19cae4d12fbcc334

    • SHA256

      80bccf93740f4fd46f179f07ac06a68509fc02015f9b04c47aa4c326ed3c46d2

    • SHA512

      030bef5e99b6966ddf0fd7294340ec57caf29e68e9dac6bc27bb335c54a73dd4f616e6d19724e3a513a0606e540f996b560d0e47202ab7190b02bfe36e0a6682

    • SSDEEP

      24576:nbrSjgFh+5p6NWKDpHQ2j2oFcLVMtg/ZHFBocS1l7x/xCJKnYLSx5+YtuMgqu:bGjgIgHQ45c+gY7mJmuMgqu

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks