General

  • Target

    Sorillas.jar

  • Size

    10.0MB

  • Sample

    250203-rgt2psvmhk

  • MD5

    7e3c3eadd00b0903f1fcc806536cf406

  • SHA1

    efe17275ac9ffc91fb1ce25f579fbfa1f8dc6095

  • SHA256

    6dfff4c60b32f6e841b1e7cf4ea99831820f4aa2dd81421d7257bdfedcd28365

  • SHA512

    9dcd295c96f6beab8fb5af447fa759bbf7ff1154f345affeff1b06e2f205e561cd6eb31db23f3656e751d0892c4b766112684068b43bb4e70a075c1a909a2abc

  • SSDEEP

    196608:ulloD+JyfJIFFM0rT/mpDni/Mcd8qAbPeGmeIWvhAn9QrmE:uHoz0FM02JiEQ/kGdeIWJC9Qrx

Malware Config

Targets

    • Target

      Sorillas.jar

    • Size

      10.0MB

    • MD5

      7e3c3eadd00b0903f1fcc806536cf406

    • SHA1

      efe17275ac9ffc91fb1ce25f579fbfa1f8dc6095

    • SHA256

      6dfff4c60b32f6e841b1e7cf4ea99831820f4aa2dd81421d7257bdfedcd28365

    • SHA512

      9dcd295c96f6beab8fb5af447fa759bbf7ff1154f345affeff1b06e2f205e561cd6eb31db23f3656e751d0892c4b766112684068b43bb4e70a075c1a909a2abc

    • SSDEEP

      196608:ulloD+JyfJIFFM0rT/mpDni/Mcd8qAbPeGmeIWvhAn9QrmE:uHoz0FM02JiEQ/kGdeIWJC9Qrx

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks