General

  • Target

    f3a51acf1e4eab3cf015b1587d16d2ec_JaffaCakes118

  • Size

    43KB

  • Sample

    240924-pp777avdnq

  • MD5

    f3a51acf1e4eab3cf015b1587d16d2ec

  • SHA1

    8aaa8673faaea7e4d9cec3b86721d864554be2e3

  • SHA256

    c9c7f88e577567421024a21bde167dfd1d2694b08695f7d97bcbe18c5d5f9d03

  • SHA512

    c697c72de9652b045ab7f8f5056a5a66bb1c4d62f8f0d1ee1752ebe5e3c52c88c7e84c186a383a60e8d1507fb4a6398cb44eb27ac3e2efdf5fb1886cd88f9357

  • SSDEEP

    384:AZysQNU1SoycwJO3l9WhYYsECcEPvTI8Gdz0Iij+ZsNO3PlpJKkkjh/TzF7pWn00:mQqglcwJkFfDLIBuXQ/oNC+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

0.tcp.ngrok.io:15303

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      f3a51acf1e4eab3cf015b1587d16d2ec_JaffaCakes118

    • Size

      43KB

    • MD5

      f3a51acf1e4eab3cf015b1587d16d2ec

    • SHA1

      8aaa8673faaea7e4d9cec3b86721d864554be2e3

    • SHA256

      c9c7f88e577567421024a21bde167dfd1d2694b08695f7d97bcbe18c5d5f9d03

    • SHA512

      c697c72de9652b045ab7f8f5056a5a66bb1c4d62f8f0d1ee1752ebe5e3c52c88c7e84c186a383a60e8d1507fb4a6398cb44eb27ac3e2efdf5fb1886cd88f9357

    • SSDEEP

      384:AZysQNU1SoycwJO3l9WhYYsECcEPvTI8Gdz0Iij+ZsNO3PlpJKkkjh/TzF7pWn00:mQqglcwJkFfDLIBuXQ/oNC+L

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks