General

  • Target

    5e7106b70b4e4c7e35ac9b2f7235f21e_JaffaCakes118

  • Size

    43KB

  • Sample

    241019-yx26ksybkk

  • MD5

    5e7106b70b4e4c7e35ac9b2f7235f21e

  • SHA1

    ad4bba0282e58bb39c1a3a87c1ab70d0df6bf22a

  • SHA256

    7e84e41b4a79567c6ab583ed0ece17d8ed7e971d7d6289aaa9f4d1d5246aaf0d

  • SHA512

    5efa9756c853a7f8d64724b16d819fd4ab1c6440fa6c93157740083952a19b28e47ba6b216bec5365c3cf0adc7d76ec804020b5a92fdaa097790ea6cbbd7793a

  • SSDEEP

    384:KZynx31mmkuHQUyzvnNXPGeGEE1XdP9fQzAIij+ZsNO3PlpJKkkjh/TzF7pWn3BB:IA3kgwhzfNftG1B9muXQ/o2p+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

Demon

C2

demon22752.hopto.org:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      5e7106b70b4e4c7e35ac9b2f7235f21e_JaffaCakes118

    • Size

      43KB

    • MD5

      5e7106b70b4e4c7e35ac9b2f7235f21e

    • SHA1

      ad4bba0282e58bb39c1a3a87c1ab70d0df6bf22a

    • SHA256

      7e84e41b4a79567c6ab583ed0ece17d8ed7e971d7d6289aaa9f4d1d5246aaf0d

    • SHA512

      5efa9756c853a7f8d64724b16d819fd4ab1c6440fa6c93157740083952a19b28e47ba6b216bec5365c3cf0adc7d76ec804020b5a92fdaa097790ea6cbbd7793a

    • SSDEEP

      384:KZynx31mmkuHQUyzvnNXPGeGEE1XdP9fQzAIij+ZsNO3PlpJKkkjh/TzF7pWn3BB:IA3kgwhzfNftG1B9muXQ/o2p+L

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks