General
-
Target
1febff56b1d084aa07180b1023f74fcf_JaffaCakes118
-
Size
340KB
-
Sample
240507-jj2kkafc3z
-
MD5
1febff56b1d084aa07180b1023f74fcf
-
SHA1
b41264792c40e579aee3f322b56ecb02ca25731c
-
SHA256
b189c98026693dc35e6da2e8b54057891aba4f698330af3e40b4b9322e6fb9e8
-
SHA512
7cc5d819265e3ad4cfa882d596d52011ccbee6389fae9551c583633b2721d57e5c57bb7a243a611aa6bf4d7b04dd9778991ac1aedb28c3e0e3b957f8a870c088
-
SSDEEP
6144:QGRQziaMSeIzmO3eFs21iMk2UE0uon7BLL/nA:QGRQzRwUmO3f21beE0uQ5L
Behavioral task
behavioral1
Sample
1febff56b1d084aa07180b1023f74fcf_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1febff56b1d084aa07180b1023f74fcf_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
njrat
0.6.4
تم الاختراق من قبل دكتور الغربية #
Dr187.ddns.net:999
59e66e4fd01ed7a53bb65713760bdb7d
-
reg_key
59e66e4fd01ed7a53bb65713760bdb7d
-
splitter
|'|'|
Targets
-
-
Target
1febff56b1d084aa07180b1023f74fcf_JaffaCakes118
-
Size
340KB
-
MD5
1febff56b1d084aa07180b1023f74fcf
-
SHA1
b41264792c40e579aee3f322b56ecb02ca25731c
-
SHA256
b189c98026693dc35e6da2e8b54057891aba4f698330af3e40b4b9322e6fb9e8
-
SHA512
7cc5d819265e3ad4cfa882d596d52011ccbee6389fae9551c583633b2721d57e5c57bb7a243a611aa6bf4d7b04dd9778991ac1aedb28c3e0e3b957f8a870c088
-
SSDEEP
6144:QGRQziaMSeIzmO3eFs21iMk2UE0uon7BLL/nA:QGRQzRwUmO3f21beE0uQ5L
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1