General

  • Target

    6a4a1f56de6ede68e5ef6c3485270318_JaffaCakes118

  • Size

    43KB

  • Sample

    240523-jzqg8sac74

  • MD5

    6a4a1f56de6ede68e5ef6c3485270318

  • SHA1

    b85e0f97cba60c6db715208f2d5b44bf96ff1a32

  • SHA256

    691ef4b71ea7e9ad8b716897745112c914c44de9b0bc9e40237190a7a0e3742a

  • SHA512

    99dcaa5e85fbc1a7b28e1ba31e934d709d86b373d6f0c246647b955bc4a53cde068c0d8dd7d890d68352f379e06529cdffa639e7294cf07a82d05581f4b9460e

  • SSDEEP

    384:0ZyPmCn1iDcsyEqtBfQEGCAMtGyOEBW9D9O5UE5QzwBlpJNakkjh/TzF7pWna/gy:CcnU4pEqtNQE5YynvQO+jt+L

Malware Config

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

127.0.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |Hassan|

Targets

    • Target

      6a4a1f56de6ede68e5ef6c3485270318_JaffaCakes118

    • Size

      43KB

    • MD5

      6a4a1f56de6ede68e5ef6c3485270318

    • SHA1

      b85e0f97cba60c6db715208f2d5b44bf96ff1a32

    • SHA256

      691ef4b71ea7e9ad8b716897745112c914c44de9b0bc9e40237190a7a0e3742a

    • SHA512

      99dcaa5e85fbc1a7b28e1ba31e934d709d86b373d6f0c246647b955bc4a53cde068c0d8dd7d890d68352f379e06529cdffa639e7294cf07a82d05581f4b9460e

    • SSDEEP

      384:0ZyPmCn1iDcsyEqtBfQEGCAMtGyOEBW9D9O5UE5QzwBlpJNakkjh/TzF7pWna/gy:CcnU4pEqtNQE5YynvQO+jt+L

    Score
    7/10
    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks