General

  • Target

    JaffaCakes118_61958a48f9dbd797759a84194d4eec30

  • Size

    181KB

  • Sample

    250102-aw1pcstjf1

  • MD5

    61958a48f9dbd797759a84194d4eec30

  • SHA1

    556672df447ae19721e32e9aa2b5e8008324818c

  • SHA256

    9f59be2318422385df731894b8d0ac1ad3de7ef863c8c4d3ee87a12b185a420a

  • SHA512

    557ba02c4f1f10d1c99b38aed2f406d94e22433be12949070e6367cb956f77daf8fe1371002aeb663909f0eb77d8a7db32c6757cf0d3523ad411c5509c5c3ded

  • SSDEEP

    3072:ww0uY/dqQQwwAxIKj1xU/eP2sWpcArH7FvRiHcWT6dVlQ0zPePVDBuBjUPFGoaa:wwbmwsIs1xRP2sWNrH7TSbYjlPYXqHP

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

علي الكعبي

C2

alawe5.ddns.net:1525

Mutex

4bc44216fa697f444bbb61af4b1f0d44

Attributes
  • reg_key

    4bc44216fa697f444bbb61af4b1f0d44

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_61958a48f9dbd797759a84194d4eec30

    • Size

      181KB

    • MD5

      61958a48f9dbd797759a84194d4eec30

    • SHA1

      556672df447ae19721e32e9aa2b5e8008324818c

    • SHA256

      9f59be2318422385df731894b8d0ac1ad3de7ef863c8c4d3ee87a12b185a420a

    • SHA512

      557ba02c4f1f10d1c99b38aed2f406d94e22433be12949070e6367cb956f77daf8fe1371002aeb663909f0eb77d8a7db32c6757cf0d3523ad411c5509c5c3ded

    • SSDEEP

      3072:ww0uY/dqQQwwAxIKj1xU/eP2sWpcArH7FvRiHcWT6dVlQ0zPePVDBuBjUPFGoaa:wwbmwsIs1xRP2sWNrH7TSbYjlPYXqHP

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks