General

  • Target

    fcfc0891e383dd78bea0b738b2771643_JaffaCakes118

  • Size

    1.6MB

  • Sample

    240420-rzls2sbd3v

  • MD5

    fcfc0891e383dd78bea0b738b2771643

  • SHA1

    2d6e58beac2275d8f23d5cdcec08af3b82123376

  • SHA256

    c6af10736db72c425555f5e62b2b954fceb9d541aa8dd593bb0f1ca91c9a9b52

  • SHA512

    6c617c3c519580ca79841139ba85864d0a8339251cf8b75654effc71dbbc2ac42be76df8fe809ff8f52a65254495b6a69f157b7a5029192c53d034973e89dbcc

  • SSDEEP

    49152:ch+ZkldoPKi2a9D5SOgTjjhKQVHoF/uY:N2cPKi15SThPVIF

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

soft

C2

googlyoutuob.ddns.net:1177

Mutex

5e9d00b3a9bfb0f9311b1d29c32b918a

Attributes
  • reg_key

    5e9d00b3a9bfb0f9311b1d29c32b918a

  • splitter

    |'|'|

Targets

    • Target

      fcfc0891e383dd78bea0b738b2771643_JaffaCakes118

    • Size

      1.6MB

    • MD5

      fcfc0891e383dd78bea0b738b2771643

    • SHA1

      2d6e58beac2275d8f23d5cdcec08af3b82123376

    • SHA256

      c6af10736db72c425555f5e62b2b954fceb9d541aa8dd593bb0f1ca91c9a9b52

    • SHA512

      6c617c3c519580ca79841139ba85864d0a8339251cf8b75654effc71dbbc2ac42be76df8fe809ff8f52a65254495b6a69f157b7a5029192c53d034973e89dbcc

    • SSDEEP

      49152:ch+ZkldoPKi2a9D5SOgTjjhKQVHoF/uY:N2cPKi15SThPVIF

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks