General
-
Target
dc1d0319a87205834977c9193840bdbf_JaffaCakes118
-
Size
93KB
-
Sample
240912-j6zdqazakd
-
MD5
dc1d0319a87205834977c9193840bdbf
-
SHA1
70784a051b32b34a71e73762bdd03f77186143d4
-
SHA256
01fdfc314bfab5c7d0cf774aba4dfabc0b503b7e7d91eb1016d8b5a7fcbc83f6
-
SHA512
efd137d0eeb1dd5c1709ab220b9f446ec76897ffdda12d884e708275751e2c5c67f7f9041bb54778307a8d0c025e8456c0bbaf3b08474e7ad27c39eb3a809dca
-
SSDEEP
768:3Da0mkspJtyZA/vMHTi9bD5NjHmLRpbZG3bV/aPfQpFx:za0mkSbnYi9bFlUfQpf
Behavioral task
behavioral1
Sample
dc1d0319a87205834977c9193840bdbf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc1d0319a87205834977c9193840bdbf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
v2.0
HacKed
4.tcp.ngrok.io:15315
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
dc1d0319a87205834977c9193840bdbf_JaffaCakes118
-
Size
93KB
-
MD5
dc1d0319a87205834977c9193840bdbf
-
SHA1
70784a051b32b34a71e73762bdd03f77186143d4
-
SHA256
01fdfc314bfab5c7d0cf774aba4dfabc0b503b7e7d91eb1016d8b5a7fcbc83f6
-
SHA512
efd137d0eeb1dd5c1709ab220b9f446ec76897ffdda12d884e708275751e2c5c67f7f9041bb54778307a8d0c025e8456c0bbaf3b08474e7ad27c39eb3a809dca
-
SSDEEP
768:3Da0mkspJtyZA/vMHTi9bD5NjHmLRpbZG3bV/aPfQpFx:za0mkSbnYi9bFlUfQpf
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1