General

  • Target

    c00f7d82150775e2d68de0dc67284845_JaffaCakes118

  • Size

    193KB

  • MD5

    c00f7d82150775e2d68de0dc67284845

  • SHA1

    c7ad35c74851748a32389e66589a43a73a02208e

  • SHA256

    ce5838a57e1f130de9f51b076c129e1d98b0451202715f74f023d43dac0c8fd5

  • SHA512

    c8f71a8cbcbd66abc38318b71185820c0eba99dbe2e6d8fc0450127b7c73c0958f7f93eeb59df97d8b8cac881191db5fde7cd3b9f870e237c231263eff19f013

  • SSDEEP

    3072:YqRaMrUwmuvDWLcxjsNmVD7j6VDuatFd/uB15Jjj2YTZ+QuBvto0z4GEKzfRP3JV:Ynx1Wj3njsZf/ubPtuvto0zIKbRPOXQ

Score
10/10

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

Derruba wify 2.9

C2

amofamilia.duckdns.org:1177

Mutex

e1d27be8778b71bec4f3b3adec764943

Attributes
  • reg_key

    e1d27be8778b71bec4f3b3adec764943

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 2 IoCs

Files

  • c00f7d82150775e2d68de0dc67284845_JaffaCakes118
    .exe windows:4 windows x86 arch:x86

    29b61e5a552b3a9bc00953de1c93be41


    Headers

    Imports

    Sections

  • Derruba wify 2.9.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Pinger.bat