General

  • Target

    JaffaCakes118_5b572bea2d6b56907d78d722b382ee30

  • Size

    285KB

  • Sample

    250101-tezkhstpgl

  • MD5

    5b572bea2d6b56907d78d722b382ee30

  • SHA1

    8d8e93390beaf88bee51e8ae52a23a48799b47ed

  • SHA256

    8d36a9fbd7cb689672489b3e2d8b769e07fdcc06cc410ee0ccc2b8e5ec36bd57

  • SHA512

    750af86e429fc96c9d4595b0df1dc8a805b53720e631bb63e905fd5be99ffed423df6c60d661270644af44a18bf0b656feabcc716897b0ec33584dbf2a9f0dd2

  • SSDEEP

    768:pZZpe06/gmAV4+RiHdxOnW5MedsruJDWaS77BKbwexZw32SLg0innjhyVT8w:n6/gmM2WW5MeGD7BKb7+it2Aw

Malware Config

Extracted

Family

njrat

Version

0.6.4

Botnet

sara

C2

mouhamed0123.no-ip.biz:1177

Mutex

d06e5204d6dc66dc117e509f9784b277

Attributes
  • reg_key

    d06e5204d6dc66dc117e509f9784b277

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_5b572bea2d6b56907d78d722b382ee30

    • Size

      285KB

    • MD5

      5b572bea2d6b56907d78d722b382ee30

    • SHA1

      8d8e93390beaf88bee51e8ae52a23a48799b47ed

    • SHA256

      8d36a9fbd7cb689672489b3e2d8b769e07fdcc06cc410ee0ccc2b8e5ec36bd57

    • SHA512

      750af86e429fc96c9d4595b0df1dc8a805b53720e631bb63e905fd5be99ffed423df6c60d661270644af44a18bf0b656feabcc716897b0ec33584dbf2a9f0dd2

    • SSDEEP

      768:pZZpe06/gmAV4+RiHdxOnW5MedsruJDWaS77BKbwexZw32SLg0innjhyVT8w:n6/gmM2WW5MeGD7BKb7+it2Aw

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks