General

  • Target

    f0e38cb5564a416a69d54e85af4f5b40_JaffaCakes118

  • Size

    43KB

  • Sample

    240922-ads7kasaka

  • MD5

    f0e38cb5564a416a69d54e85af4f5b40

  • SHA1

    dd143da1da6d3a327e5fb8965c18d5c6518344dc

  • SHA256

    a984108cbf49aca81b1a4c9a73315d2b9638f0a2b0fb9e4cdb009855cac8e4db

  • SHA512

    2878d98c68ea8cb538573abe73b755b1c5bef869b28f45aa65017028d287bd67d36f59149eab1e36f7d4f794ee2836e6ae81673e4c7b6de585b926e9417a302e

  • SSDEEP

    384:rZylrsVqb08yPIpXixeCGEslmcNz0Iij+ZsNO3PlpJKkkjh/TzF7pWnolgreT0pe:Fors8Y5PId6ROlBuXQ/oRl+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HackOPKA

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      f0e38cb5564a416a69d54e85af4f5b40_JaffaCakes118

    • Size

      43KB

    • MD5

      f0e38cb5564a416a69d54e85af4f5b40

    • SHA1

      dd143da1da6d3a327e5fb8965c18d5c6518344dc

    • SHA256

      a984108cbf49aca81b1a4c9a73315d2b9638f0a2b0fb9e4cdb009855cac8e4db

    • SHA512

      2878d98c68ea8cb538573abe73b755b1c5bef869b28f45aa65017028d287bd67d36f59149eab1e36f7d4f794ee2836e6ae81673e4c7b6de585b926e9417a302e

    • SSDEEP

      384:rZylrsVqb08yPIpXixeCGEslmcNz0Iij+ZsNO3PlpJKkkjh/TzF7pWnolgreT0pe:Fors8Y5PId6ROlBuXQ/oRl+L

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks