General

  • Target

    f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118

  • Size

    538KB

  • Sample

    240922-a7ew2atekm

  • MD5

    f0f41a9bda22da851ecafcd69666fb73

  • SHA1

    b5f6dd57b4f77e3ecde6dc863557401696feb6a5

  • SHA256

    5b0d776d373c0195d06e08a7aa9d482d3d0d1f91161fa6a3f02376edd70a2321

  • SHA512

    1ed9deb42d9e28e73b337c83081db26f9e9e985da0e1b00a4f1debfd3b952ea6b94789ec328fdd843e9996458e6db82c970d0f94fd10f92f6f986ecc786ca16d

  • SSDEEP

    12288:werJ+vB8cAkvZo8iFIMPykLDZavM3d5tJaRibByNAlN:+CcAkRZrSwm5tf

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Dahia

C2

hajrsehi.ddns.net:1177

Mutex

123899f12e668b238c13e4330d862929

Attributes
  • reg_key

    123899f12e668b238c13e4330d862929

  • splitter

    |'|'|

Targets

    • Target

      f0f41a9bda22da851ecafcd69666fb73_JaffaCakes118

    • Size

      538KB

    • MD5

      f0f41a9bda22da851ecafcd69666fb73

    • SHA1

      b5f6dd57b4f77e3ecde6dc863557401696feb6a5

    • SHA256

      5b0d776d373c0195d06e08a7aa9d482d3d0d1f91161fa6a3f02376edd70a2321

    • SHA512

      1ed9deb42d9e28e73b337c83081db26f9e9e985da0e1b00a4f1debfd3b952ea6b94789ec328fdd843e9996458e6db82c970d0f94fd10f92f6f986ecc786ca16d

    • SSDEEP

      12288:werJ+vB8cAkvZo8iFIMPykLDZavM3d5tJaRibByNAlN:+CcAkRZrSwm5tf

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks