General

  • Target

    f6a5be68e65b851a4ec1a3bd49f6b86d_JaffaCakes118

  • Size

    23KB

  • Sample

    240925-xhqzbs1gjq

  • MD5

    f6a5be68e65b851a4ec1a3bd49f6b86d

  • SHA1

    6b9ab8923dfbbcf28356b1a00511f8b66921a1bf

  • SHA256

    3ead63a41c5bf925c4a22a9aeaa52c0c8b67e9df6e2c05486d3d3533efb3dd4c

  • SHA512

    fc71735b43c8444b6af1910970b10391702ca0e7d0747bec4554f83cf84526a98f10693403516f8898d6d6c15e0776d836682a9a9ba5fd7b4d2e8495ef3a618e

  • SSDEEP

    384:zfQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZV3:zA5yBVd7Rpcnuq

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Dahia

C2

hajrsehi.ddns.net:1177

Mutex

5e26cd0bdf19bf4d684bb09c9321bb46

Attributes
  • reg_key

    5e26cd0bdf19bf4d684bb09c9321bb46

  • splitter

    |'|'|

Targets

    • Target

      f6a5be68e65b851a4ec1a3bd49f6b86d_JaffaCakes118

    • Size

      23KB

    • MD5

      f6a5be68e65b851a4ec1a3bd49f6b86d

    • SHA1

      6b9ab8923dfbbcf28356b1a00511f8b66921a1bf

    • SHA256

      3ead63a41c5bf925c4a22a9aeaa52c0c8b67e9df6e2c05486d3d3533efb3dd4c

    • SHA512

      fc71735b43c8444b6af1910970b10391702ca0e7d0747bec4554f83cf84526a98f10693403516f8898d6d6c15e0776d836682a9a9ba5fd7b4d2e8495ef3a618e

    • SSDEEP

      384:zfQeCo2zmZbQHkJeCdUwBvQ61gjuQBnB9mRvR6JZlbw8hqIusZzZV3:zA5yBVd7Rpcnuq

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks