General

  • Target

    f3074748f086a9a07430619f7bc59e7d_JaffaCakes118

  • Size

    17KB

  • Sample

    241215-jr9wxayjds

  • MD5

    f3074748f086a9a07430619f7bc59e7d

  • SHA1

    935019f102148a32d6e8a93642f414671e6c6c34

  • SHA256

    7b7c4da87fd58d5a6cb90c2c217d288c06c9b4a4a5720dcb7227c4f62a32d969

  • SHA512

    26361c1d7a1c82b5401e2445a7fcd758d63fd7618fe1ef1cdbee4106abb4b1fcdb51c85e450249f8725221e3d7b7b1e295911238d899d6db89f0e65ce2483cdc

  • SSDEEP

    384:qQu9f8Ht3KcXhwibXT/DhQILPGqAZ1UnhXXaijxoO6thrV:g4KAhw4DLKVqLa+SOw

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

312312312

C2

185.60.133.214:4432

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      Новая папка/hask.exe

    • Size

      43KB

    • MD5

      d6b54455b0f174d6c6e08840adc92687

    • SHA1

      b0b61c00597f502652fa39362a827b6183831dcf

    • SHA256

      8072ade2624d0ec2379f2d7c04311bb80d26100b2cfbb43a04bd3f7b0de71869

    • SHA512

      cef4c9722cbc40adecf369435b407d15efa54d8d8c021c2b29481c709ca139098035464c94daafe35607a3b262ce140dc5bcdb7a4de2b56f5972b4f2aae9e23a

    • SSDEEP

      384:L8ZyV+psyCEFmVoybZJEH4OQE58DMghYzEIij+ZsNO3PlpJKkkjh/TzF7pWnDggW:L6NpsyVAVlbDW/SggYuXQ/o+E+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks