Resubmissions

21-09-2024 00:53

240921-a8qd6axcrb 10

20-09-2024 23:09

240920-248tgstdnk 10

General

  • Target

    ee9c59ed661de901b23475e7b6af8c5c_JaffaCakes118

  • Size

    252KB

  • Sample

    240920-248tgstdnk

  • MD5

    ee9c59ed661de901b23475e7b6af8c5c

  • SHA1

    34a9f7397cbac20c422067683b1bb87659d4c3c6

  • SHA256

    25e5c94e59845bf8f4096d2eee10ab131e31096b957e1034c1fc0fd1164c1927

  • SHA512

    d3d2d301f6a81005a7134ba756bf91765b311f992cb882cc94501c2ecd494a80666ce6f4a6a07bfa16ea5b15d523fa2c7917906b3a4c7deff38ddfd55ae753a6

  • SSDEEP

    3072:bYs03EcckEmNoSsmfYgaKSRye29MXHPJ+TBVPRvdlDrwpxaZb8ywfxs54xoWav4M:s0Ss75S9cJ+503g8/0QO

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

تم الاختراق من قبل دكتور الغربية #

C2

Dr187.ddns.net:999

Mutex

59e66e4fd01ed7a53bb65713760bdb7d

Attributes
  • reg_key

    59e66e4fd01ed7a53bb65713760bdb7d

  • splitter

    |'|'|

Targets

    • Target

      ee9c59ed661de901b23475e7b6af8c5c_JaffaCakes118

    • Size

      252KB

    • MD5

      ee9c59ed661de901b23475e7b6af8c5c

    • SHA1

      34a9f7397cbac20c422067683b1bb87659d4c3c6

    • SHA256

      25e5c94e59845bf8f4096d2eee10ab131e31096b957e1034c1fc0fd1164c1927

    • SHA512

      d3d2d301f6a81005a7134ba756bf91765b311f992cb882cc94501c2ecd494a80666ce6f4a6a07bfa16ea5b15d523fa2c7917906b3a4c7deff38ddfd55ae753a6

    • SSDEEP

      3072:bYs03EcckEmNoSsmfYgaKSRye29MXHPJ+TBVPRvdlDrwpxaZb8ywfxs54xoWav4M:s0Ss75S9cJ+503g8/0QO

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks