General
-
Target
e5b6bbe7a93000a56482481f79c430a5_JaffaCakes118
-
Size
102KB
-
Sample
240916-2t7hnstgng
-
MD5
e5b6bbe7a93000a56482481f79c430a5
-
SHA1
2df0950882a98d436539e391c0bd6dfd1880de11
-
SHA256
a4b72bc722028cec151ea4989fc19607f6b78d7dba90ce89b23355cffab6a101
-
SHA512
62072a704f5909daf5c2479add3bfb5b7529f6f3d873330e15f9eff76e27fee964df74b60212e8979508be452bad3292770a123759ce6fbfc361eb254ec6bc41
-
SSDEEP
3072:VERGalxEdeL50aYc/kuRyl2HmzVmlKV+elaJY/:VyxetyRylqaV6eMO/
Static task
static1
Behavioral task
behavioral1
Sample
report.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
report.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.6.4
HacKed
m100.no-ip.info:7777
152db0c690a8f99c617fcaae2b84e3d0
-
reg_key
152db0c690a8f99c617fcaae2b84e3d0
-
splitter
|'|'|
Targets
-
-
Target
report.exe
-
Size
171KB
-
MD5
0490e4682182beb78dbd1d38a0c06710
-
SHA1
21630d537409fc3543096ce2fbbff703a249cdf8
-
SHA256
b47ffaafc061171b1e974de37aa21fdc15fa27a70641e03b1c103cad70feb445
-
SHA512
9efc319632c067402e264b25157100082c6b7b10fe69447e081a174a2a4ec5b6cc7a5b8e487e83ff80d5e0c6760edea5dfdd197532cb7b65631ab6c67c4fffc6
-
SSDEEP
3072:EGq0qx4vehcVKrlgYTep7TReAQYgRU1f8Ev0VevFpP3Bm51bGAQJKuQ3:fq0qxvlyh7g/YgR4fJFpP3Bm51Ta
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1