General
-
Target
c00f7d82150775e2d68de0dc67284845_JaffaCakes118
-
Size
193KB
-
Sample
240825-ga7n4sxdng
-
MD5
c00f7d82150775e2d68de0dc67284845
-
SHA1
c7ad35c74851748a32389e66589a43a73a02208e
-
SHA256
ce5838a57e1f130de9f51b076c129e1d98b0451202715f74f023d43dac0c8fd5
-
SHA512
c8f71a8cbcbd66abc38318b71185820c0eba99dbe2e6d8fc0450127b7c73c0958f7f93eeb59df97d8b8cac881191db5fde7cd3b9f870e237c231263eff19f013
-
SSDEEP
3072:YqRaMrUwmuvDWLcxjsNmVD7j6VDuatFd/uB15Jjj2YTZ+QuBvto0z4GEKzfRP3JV:Ynx1Wj3njsZf/ubPtuvto0zIKbRPOXQ
Behavioral task
behavioral1
Sample
c00f7d82150775e2d68de0dc67284845_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c00f7d82150775e2d68de0dc67284845_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Derruba wify 2.9.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Derruba wify 2.9.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Pinger.bat
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Pinger.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.7d
Derruba wify 2.9
amofamilia.duckdns.org:1177
e1d27be8778b71bec4f3b3adec764943
-
reg_key
e1d27be8778b71bec4f3b3adec764943
-
splitter
|'|'|
Targets
-
-
Target
c00f7d82150775e2d68de0dc67284845_JaffaCakes118
-
Size
193KB
-
MD5
c00f7d82150775e2d68de0dc67284845
-
SHA1
c7ad35c74851748a32389e66589a43a73a02208e
-
SHA256
ce5838a57e1f130de9f51b076c129e1d98b0451202715f74f023d43dac0c8fd5
-
SHA512
c8f71a8cbcbd66abc38318b71185820c0eba99dbe2e6d8fc0450127b7c73c0958f7f93eeb59df97d8b8cac881191db5fde7cd3b9f870e237c231263eff19f013
-
SSDEEP
3072:YqRaMrUwmuvDWLcxjsNmVD7j6VDuatFd/uB15Jjj2YTZ+QuBvto0z4GEKzfRP3JV:Ynx1Wj3njsZf/ubPtuvto0zIKbRPOXQ
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
Derruba wify 2.9.exe
-
Size
23KB
-
MD5
340aeb18fbdfa12c0609c08ee01ea82a
-
SHA1
fcb02e86594074a5c549041413dc98d0a25d2931
-
SHA256
04f596d4cee94417466c18d319398570d1e35a475c92543c64fd2605edee9fcc
-
SHA512
a8c768c538c0955a36e25a7de2b6dd89b6a755f6ae514d1035a172cd7946330c53ea70cfd739f5787ead218f3cf9d053eab2c7323dd6203f242214f89ba49545
-
SSDEEP
384:8n8aY1ia0N/IH+WUiWiLcXyUTly2Rc87po6ngB8W+tqlf5mRvR6JZlbw8hqIusZC:8m1Re/E+WUiW6ci6NR7tZRpcnur
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
Pinger.bat
-
Size
3KB
-
MD5
93e0eb0f20794d18a8885ec2d947ccdf
-
SHA1
acfc71f2caec70829c59d86a17667c4f9f138fe8
-
SHA256
6df4a8f23ae3dca463232b8f8b1e8ce83e51deda3e131a173ec16bf2fc9b8683
-
SHA512
f51db4799e9cd7f3289875792eefc571b6e272f11e2a3d2274b19856d400c76e5ac96c8185122b7a2d0f2a90e9e77ecb298cf9a4a7156b39381c1d18fed2105d
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1