General
-
Target
16a92feed7af2c2b08d2ef4095942af4_JaffaCakes118
-
Size
600KB
-
Sample
240505-jkas8sbd5z
-
MD5
16a92feed7af2c2b08d2ef4095942af4
-
SHA1
f2b703e4798c2a14bc587448f6f7c0968b9ae77f
-
SHA256
83a1769c9b83fd860dddcfa6dfaf72ea86eec91581ef767de159c9a58b9fede7
-
SHA512
caec15421b6e34267fedd283c708369b26f3abdf49400d28cf5c7a124d5ba5d0edd7403654d67dea9f5c582bbb9fc48b7512851db1197372ef8176b7f97ceeab
-
SSDEEP
12288:1xWzIAamOt/OjXUQ/O3GZ/a+a1iKW8+Uqi3w/NzYo+xmuM:1xWzIAamOtuDe6/3Y
Behavioral task
behavioral1
Sample
16a92feed7af2c2b08d2ef4095942af4_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
njrat
0.7.3
Office
160.116.15.134:3361
Client.exe
-
reg_key
Client.exe
-
splitter
1122
Targets
-
-
Target
16a92feed7af2c2b08d2ef4095942af4_JaffaCakes118
-
Size
600KB
-
MD5
16a92feed7af2c2b08d2ef4095942af4
-
SHA1
f2b703e4798c2a14bc587448f6f7c0968b9ae77f
-
SHA256
83a1769c9b83fd860dddcfa6dfaf72ea86eec91581ef767de159c9a58b9fede7
-
SHA512
caec15421b6e34267fedd283c708369b26f3abdf49400d28cf5c7a124d5ba5d0edd7403654d67dea9f5c582bbb9fc48b7512851db1197372ef8176b7f97ceeab
-
SSDEEP
12288:1xWzIAamOt/OjXUQ/O3GZ/a+a1iKW8+Uqi3w/NzYo+xmuM:1xWzIAamOtuDe6/3Y
-
Drops startup file
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-