General

  • Target

    JaffaCakes118_523fc109d1af169e33450f7a22ade780

  • Size

    23KB

  • Sample

    250101-mzmywsvqcn

  • MD5

    523fc109d1af169e33450f7a22ade780

  • SHA1

    0a1caf6b0fb09a43995f3714ecdbb651fb5b94fe

  • SHA256

    df0e80346cf5e35a6c0e840620455a85fa2b4e76d1e3115ec401e457dcc06b93

  • SHA512

    49d51826bf8ddfb32711f903595cee4aaf947fde4ea3381f554ecb3fb59391e417909c8836b7b01d41504b3d71c7083bce8db24bc9df375fc4b46fda41b4e047

  • SSDEEP

    384:unalDC2twBo4SU7ly2RO8bJo6Hghc2JF/ZmRvR6JZlbw8hqIusZzZZRxcuW:ZdsHNRNRpcnukRW9

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

سجاد الزبيدي

C2

sajad123455sajad.no-ip.biz:5552

Mutex

8521abbd112b65f871605ce04dcd0539

Attributes
  • reg_key

    8521abbd112b65f871605ce04dcd0539

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_523fc109d1af169e33450f7a22ade780

    • Size

      23KB

    • MD5

      523fc109d1af169e33450f7a22ade780

    • SHA1

      0a1caf6b0fb09a43995f3714ecdbb651fb5b94fe

    • SHA256

      df0e80346cf5e35a6c0e840620455a85fa2b4e76d1e3115ec401e457dcc06b93

    • SHA512

      49d51826bf8ddfb32711f903595cee4aaf947fde4ea3381f554ecb3fb59391e417909c8836b7b01d41504b3d71c7083bce8db24bc9df375fc4b46fda41b4e047

    • SSDEEP

      384:unalDC2twBo4SU7ly2RO8bJo6Hghc2JF/ZmRvR6JZlbw8hqIusZzZZRxcuW:ZdsHNRNRpcnukRW9

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks