General
-
Target
05a5346fa2d5a6364a6616a92d0ed2c0_JaffaCakes118
-
Size
184KB
-
Sample
240428-vedtgsce3s
-
MD5
05a5346fa2d5a6364a6616a92d0ed2c0
-
SHA1
7513eb1ca1f04855015df40fb369f82bd84ea5b2
-
SHA256
0c6af3f27224048739574ac36878a79982f76b7bc522db5b3642a229b566954d
-
SHA512
ec87249641518b23858f9a170153531ecca9acb81f6b0b88886c81689f940b9bf08677fa9d2b9764042b39c73cbe8412e846ab422d775d8ac01c300cdeee352b
-
SSDEEP
1536:JxqjQ+P04wsmJCLWwjOAbDOnjjzgV1D7PK1nRAKVjkOwldP:sr85CLTCAbDOnj/gV1D7PKAK2Owlx
Behavioral task
behavioral1
Sample
05a5346fa2d5a6364a6616a92d0ed2c0_JaffaCakes118.exe
Resource
win7-20240220-en
Malware Config
Extracted
njrat
0.7d
PC
zack1313.publicvm.com:6078
54ad39b024fbafb6cdb1a4ffb6386199
-
reg_key
54ad39b024fbafb6cdb1a4ffb6386199
-
splitter
|'|'|
Targets
-
-
Target
05a5346fa2d5a6364a6616a92d0ed2c0_JaffaCakes118
-
Size
184KB
-
MD5
05a5346fa2d5a6364a6616a92d0ed2c0
-
SHA1
7513eb1ca1f04855015df40fb369f82bd84ea5b2
-
SHA256
0c6af3f27224048739574ac36878a79982f76b7bc522db5b3642a229b566954d
-
SHA512
ec87249641518b23858f9a170153531ecca9acb81f6b0b88886c81689f940b9bf08677fa9d2b9764042b39c73cbe8412e846ab422d775d8ac01c300cdeee352b
-
SSDEEP
1536:JxqjQ+P04wsmJCLWwjOAbDOnjjzgV1D7PK1nRAKVjkOwldP:sr85CLTCAbDOnj/gV1D7PKAK2Owlx
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1