General
-
Target
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118
-
Size
1.6MB
-
Sample
241019-bmldrayajg
-
MD5
5a23daf9b3b5cc63cb1bc05554f08939
-
SHA1
1c5da1257668d249397f3fc678ac922623d4740d
-
SHA256
0435c7a496eac28db6f3af5ae859064cf133e7bda1ef44080d8a6bad1eade671
-
SHA512
b8816d67f0ee1a1ba298314e76257f362e04fcf15cbc048a11bd98b85829f8b508f7d5cc51713c6e1f2a4eb4274995b8cee3f836dccd575af75ef92ae23bb53a
-
SSDEEP
49152:D8iSTZdXTZdHXTZdXTZaqLd+mQb+mQ7hdDaQ7SAs:D
Static task
static1
Behavioral task
behavioral1
Sample
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
62.227.124.106:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
5a23daf9b3b5cc63cb1bc05554f08939_JaffaCakes118
-
Size
1.6MB
-
MD5
5a23daf9b3b5cc63cb1bc05554f08939
-
SHA1
1c5da1257668d249397f3fc678ac922623d4740d
-
SHA256
0435c7a496eac28db6f3af5ae859064cf133e7bda1ef44080d8a6bad1eade671
-
SHA512
b8816d67f0ee1a1ba298314e76257f362e04fcf15cbc048a11bd98b85829f8b508f7d5cc51713c6e1f2a4eb4274995b8cee3f836dccd575af75ef92ae23bb53a
-
SSDEEP
49152:D8iSTZdXTZdHXTZdXTZaqLd+mQb+mQ7hdDaQ7SAs:D
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1