General

  • Target

    e916d8bdffd2f2584972b0309367e8eb_JaffaCakes118

  • Size

    23KB

  • Sample

    240918-pdd5zazdmh

  • MD5

    e916d8bdffd2f2584972b0309367e8eb

  • SHA1

    f3bcbead64a9faa976af2beae4a90cd7f934a860

  • SHA256

    6677ee6c6eb63f596781ec8ef15cc090554b663f8a035c55407b68072845598f

  • SHA512

    cbe42f8d1e7c121cfcee56d51533b40ed4a379de4f619b70492440c11bdd5b50bcbf919ca116d47fb4b422fa7aec07c856975535ad2ce60f4dde2548c18e6a44

  • SSDEEP

    384:H9M0swn0u32uWvm8CB40OQOMn6sgCsh2FiVmmRvR6JZlbw8hqIusZzZ+q:RSkP7B4BRpcnuU

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

الـــقـــاهـــــــــــــــرة

C2

milla.publicvm.com:1177

Mutex

50861827a5031222fb7f8fc631c29ae2

Attributes
  • reg_key

    50861827a5031222fb7f8fc631c29ae2

  • splitter

    |'|'|

Targets

    • Target

      e916d8bdffd2f2584972b0309367e8eb_JaffaCakes118

    • Size

      23KB

    • MD5

      e916d8bdffd2f2584972b0309367e8eb

    • SHA1

      f3bcbead64a9faa976af2beae4a90cd7f934a860

    • SHA256

      6677ee6c6eb63f596781ec8ef15cc090554b663f8a035c55407b68072845598f

    • SHA512

      cbe42f8d1e7c121cfcee56d51533b40ed4a379de4f619b70492440c11bdd5b50bcbf919ca116d47fb4b422fa7aec07c856975535ad2ce60f4dde2548c18e6a44

    • SSDEEP

      384:H9M0swn0u32uWvm8CB40OQOMn6sgCsh2FiVmmRvR6JZlbw8hqIusZzZ+q:RSkP7B4BRpcnuU

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks