General
-
Target
74b00da0f2e4d0c8b6e2875d02fefcec_JaffaCakes118
-
Size
3.7MB
-
Sample
240526-hwl5zaah2t
-
MD5
74b00da0f2e4d0c8b6e2875d02fefcec
-
SHA1
2b8e618271ad1899c2caa9d4ee5dbd4529198046
-
SHA256
ac23fc53a20f5a19e8183bfba89bcf040d64bec45628c8f50fd80d13d4641081
-
SHA512
7a1bca3e407c263f64665713a2a94b6e4035e21b0a91adb86e7f820de5351ea9e8d7c68757264907213b9456d2c35326d4ad19b938ee3ca29cfd642cddb2e943
-
SSDEEP
98304:7957ilusIkAkVtXWZXo9Xph6w2vbXgaoqyy:vwrIkAomq9ZWbXrFyy
Behavioral task
behavioral1
Sample
74b00da0f2e4d0c8b6e2875d02fefcec_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
njrat
0.7.3
Octubre
njratnew.duckdns.org:3042
Client.exe
-
reg_key
Client.exe
-
splitter
123
Targets
-
-
Target
74b00da0f2e4d0c8b6e2875d02fefcec_JaffaCakes118
-
Size
3.7MB
-
MD5
74b00da0f2e4d0c8b6e2875d02fefcec
-
SHA1
2b8e618271ad1899c2caa9d4ee5dbd4529198046
-
SHA256
ac23fc53a20f5a19e8183bfba89bcf040d64bec45628c8f50fd80d13d4641081
-
SHA512
7a1bca3e407c263f64665713a2a94b6e4035e21b0a91adb86e7f820de5351ea9e8d7c68757264907213b9456d2c35326d4ad19b938ee3ca29cfd642cddb2e943
-
SSDEEP
98304:7957ilusIkAkVtXWZXo9Xph6w2vbXgaoqyy:vwrIkAomq9ZWbXrFyy
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-