General
-
Target
83272ae366111201b532f0c5f22a6fe7_JaffaCakes118
-
Size
29KB
-
Sample
240530-f3rb6ahb26
-
MD5
83272ae366111201b532f0c5f22a6fe7
-
SHA1
7bf1f65586685bea1e0398c582968082728ade0e
-
SHA256
dacab3f01eaf2e8c59256124dc47ab03d472a46739918f707f752d9c8d473c1e
-
SHA512
5de81da902a88ce424684dbe6564c280378165b0399f17c40cf939298c7708d840a0a06dbfb08ea19c94529fd326e1e542f50acb81aebb3643271d80c3de94bc
-
SSDEEP
768:67JEWe4PVzdmBRbqELeuBKh0p29SgROu:67JbhmBRblrKhG29jOu
Behavioral task
behavioral1
Sample
83272ae366111201b532f0c5f22a6fe7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
83272ae366111201b532f0c5f22a6fe7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
njrat
0.6.4
Control
id7oomz.ddns.net:1177
07db318145681dc5e0cbb8c76a1a4fa9
-
reg_key
07db318145681dc5e0cbb8c76a1a4fa9
-
splitter
|'|'|
Targets
-
-
Target
83272ae366111201b532f0c5f22a6fe7_JaffaCakes118
-
Size
29KB
-
MD5
83272ae366111201b532f0c5f22a6fe7
-
SHA1
7bf1f65586685bea1e0398c582968082728ade0e
-
SHA256
dacab3f01eaf2e8c59256124dc47ab03d472a46739918f707f752d9c8d473c1e
-
SHA512
5de81da902a88ce424684dbe6564c280378165b0399f17c40cf939298c7708d840a0a06dbfb08ea19c94529fd326e1e542f50acb81aebb3643271d80c3de94bc
-
SSDEEP
768:67JEWe4PVzdmBRbqELeuBKh0p29SgROu:67JbhmBRblrKhG29jOu
Score10/10-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1