General

  • Target

    JaffaCakes118_972711dd474eebf9669d6cc5fa177904769b5c048d05ccf76dd3f8c1cb5de307

  • Size

    72KB

  • Sample

    241224-xne41strbt

  • MD5

    dc51c95f484a45c846f698cf47b8e369

  • SHA1

    c51f2d6fa33a7f6df194da694c17df9f90d89650

  • SHA256

    972711dd474eebf9669d6cc5fa177904769b5c048d05ccf76dd3f8c1cb5de307

  • SHA512

    c5b494416506f2a7e97d6f4be6bb839d41b9e18272bfdd854b4c99f5bb6b3a75518078f57cc86ea47d4caee16f9fd1883f8097a480920100d56bc3794beeed5f

  • SSDEEP

    384:/ZyZUJ1Cj8syWcWrf7E5GiXeEXME5EAftz8Iij+ZsNO3PlpJKkkjh/TzF7pWn9/V:B8UJ04pWcWr7E5ZVMEzXuXQ/ocX+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:12329

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      JaffaCakes118_972711dd474eebf9669d6cc5fa177904769b5c048d05ccf76dd3f8c1cb5de307

    • Size

      72KB

    • MD5

      dc51c95f484a45c846f698cf47b8e369

    • SHA1

      c51f2d6fa33a7f6df194da694c17df9f90d89650

    • SHA256

      972711dd474eebf9669d6cc5fa177904769b5c048d05ccf76dd3f8c1cb5de307

    • SHA512

      c5b494416506f2a7e97d6f4be6bb839d41b9e18272bfdd854b4c99f5bb6b3a75518078f57cc86ea47d4caee16f9fd1883f8097a480920100d56bc3794beeed5f

    • SSDEEP

      384:/ZyZUJ1Cj8syWcWrf7E5GiXeEXME5EAftz8Iij+ZsNO3PlpJKkkjh/TzF7pWn9/V:B8UJ04pWcWr7E5ZVMEzXuXQ/ocX+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks