General

  • Target

    JaffaCakes118_5e375c8a1f1031a346d6746da592d70d

  • Size

    291KB

  • Sample

    250107-mrgrxazjer

  • MD5

    5e375c8a1f1031a346d6746da592d70d

  • SHA1

    d07729badba765240b4e3a7b83f4d5c4420d4da7

  • SHA256

    28754111f84f92bb3193d74c9183e71a750c9acf8e92803859b1dd78975c85c7

  • SHA512

    7eb22267ffbf42e4e7f26cfe16b4613fe78975d4323f4d564716fe5ff5d092c4b9e79c0417d4e5e9e7eb47baf7d481268d258937e968d9633f8ff1a8c7db1c11

  • SSDEEP

    6144:L5b5bjevaup+gXzefbnGIudk/6X44yvVe+RTPz:NbJcPSjn8q6oTtee

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

chorom

C2

ahmedstar123.ddns.net:1177

Mutex

5fa843546065a766a9db244b1f33ea6e

Attributes
  • reg_key

    5fa843546065a766a9db244b1f33ea6e

  • splitter

    |'|'|

Targets

    • Target

      JaffaCakes118_5e375c8a1f1031a346d6746da592d70d

    • Size

      291KB

    • MD5

      5e375c8a1f1031a346d6746da592d70d

    • SHA1

      d07729badba765240b4e3a7b83f4d5c4420d4da7

    • SHA256

      28754111f84f92bb3193d74c9183e71a750c9acf8e92803859b1dd78975c85c7

    • SHA512

      7eb22267ffbf42e4e7f26cfe16b4613fe78975d4323f4d564716fe5ff5d092c4b9e79c0417d4e5e9e7eb47baf7d481268d258937e968d9633f8ff1a8c7db1c11

    • SSDEEP

      6144:L5b5bjevaup+gXzefbnGIudk/6X44yvVe+RTPz:NbJcPSjn8q6oTtee

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks