General
-
Target
e82f6a62cd96530dbd268d7436fc805d_JaffaCakes118
-
Size
43KB
-
Sample
240918-db9cjsyfle
-
MD5
e82f6a62cd96530dbd268d7436fc805d
-
SHA1
e6369abc02dbd202aa620834b56dcd61f3e2ca85
-
SHA256
e1723859d029a12cfed1b485d6733623f422028d816bbdc02cf50d24671c1902
-
SHA512
54e87068184a48c18ded1a999781e4f89703317010db9d7b8973f5e5c139d0017363e40e52b6e8001eca911ca845d74cddf3b0cb7d158dd2909052a7ab767cc0
-
SSDEEP
384:nZyrABS0lwZmoy7utsMuMEhx+DEaXzoIij+ZsNO3PlpJKkkjh/TzF7pWnu/greTn:ZDFGol7As7KDzuXQ/or/+L
Behavioral task
behavioral1
Sample
e82f6a62cd96530dbd268d7436fc805d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e82f6a62cd96530dbd268d7436fc805d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
127.0.0.1:7777
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
e82f6a62cd96530dbd268d7436fc805d_JaffaCakes118
-
Size
43KB
-
MD5
e82f6a62cd96530dbd268d7436fc805d
-
SHA1
e6369abc02dbd202aa620834b56dcd61f3e2ca85
-
SHA256
e1723859d029a12cfed1b485d6733623f422028d816bbdc02cf50d24671c1902
-
SHA512
54e87068184a48c18ded1a999781e4f89703317010db9d7b8973f5e5c139d0017363e40e52b6e8001eca911ca845d74cddf3b0cb7d158dd2909052a7ab767cc0
-
SSDEEP
384:nZyrABS0lwZmoy7utsMuMEhx+DEaXzoIij+ZsNO3PlpJKkkjh/TzF7pWnu/greTn:ZDFGol7As7KDzuXQ/or/+L
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1