General

  • Target

    16a92feed7af2c2b08d2ef4095942af4_JaffaCakes118

  • Size

    600KB

  • Sample

    240505-jkas8sbd5z

  • MD5

    16a92feed7af2c2b08d2ef4095942af4

  • SHA1

    f2b703e4798c2a14bc587448f6f7c0968b9ae77f

  • SHA256

    83a1769c9b83fd860dddcfa6dfaf72ea86eec91581ef767de159c9a58b9fede7

  • SHA512

    caec15421b6e34267fedd283c708369b26f3abdf49400d28cf5c7a124d5ba5d0edd7403654d67dea9f5c582bbb9fc48b7512851db1197372ef8176b7f97ceeab

  • SSDEEP

    12288:1xWzIAamOt/OjXUQ/O3GZ/a+a1iKW8+Uqi3w/NzYo+xmuM:1xWzIAamOtuDe6/3Y

Malware Config

Extracted

Family

njrat

Version

0.7.3

Botnet

Office

C2

160.116.15.134:3361

Mutex

Client.exe

Attributes
  • reg_key

    Client.exe

  • splitter

    1122

Targets

    • Target

      16a92feed7af2c2b08d2ef4095942af4_JaffaCakes118

    • Size

      600KB

    • MD5

      16a92feed7af2c2b08d2ef4095942af4

    • SHA1

      f2b703e4798c2a14bc587448f6f7c0968b9ae77f

    • SHA256

      83a1769c9b83fd860dddcfa6dfaf72ea86eec91581ef767de159c9a58b9fede7

    • SHA512

      caec15421b6e34267fedd283c708369b26f3abdf49400d28cf5c7a124d5ba5d0edd7403654d67dea9f5c582bbb9fc48b7512851db1197372ef8176b7f97ceeab

    • SSDEEP

      12288:1xWzIAamOt/OjXUQ/O3GZ/a+a1iKW8+Uqi3w/NzYo+xmuM:1xWzIAamOtuDe6/3Y

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks