General

  • Target

    f75512379bf69d846de4b1f142b6940d_JaffaCakes118

  • Size

    23KB

  • Sample

    240926-cmv4mavajc

  • MD5

    f75512379bf69d846de4b1f142b6940d

  • SHA1

    c33f4df52792816adeb96c90c0919e89b8d76982

  • SHA256

    23bf4825d17959f442c2a75fc44e5bfac819819d1fbfb4c7afd914c47d2b9b82

  • SHA512

    346e1bd9c9e39da821a77278b87eca43af330b8a3bc17bdb6b3e6e546ec01b534763d051fda06fbaf1056ed84389a6167a12eddca731b1377a6ca56f9f09ec4c

  • SSDEEP

    384:Gz+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZPu:GMm+71d5XRpcnu9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Dahia

C2

hajrsehi.ddns.net:1177

Mutex

fab7e83dcd62d3d8767c0cbdd810a0dc

Attributes
  • reg_key

    fab7e83dcd62d3d8767c0cbdd810a0dc

  • splitter

    |'|'|

Targets

    • Target

      f75512379bf69d846de4b1f142b6940d_JaffaCakes118

    • Size

      23KB

    • MD5

      f75512379bf69d846de4b1f142b6940d

    • SHA1

      c33f4df52792816adeb96c90c0919e89b8d76982

    • SHA256

      23bf4825d17959f442c2a75fc44e5bfac819819d1fbfb4c7afd914c47d2b9b82

    • SHA512

      346e1bd9c9e39da821a77278b87eca43af330b8a3bc17bdb6b3e6e546ec01b534763d051fda06fbaf1056ed84389a6167a12eddca731b1377a6ca56f9f09ec4c

    • SSDEEP

      384:Gz+n2650N3qZbATcjRGC5Eo9D46BgnqUhay1ZmRvR6JZlbw8hqIusZzZPu:GMm+71d5XRpcnu9

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks