General
-
Target
753c707e47bce65d32be781ea1584e0b_JaffaCakes118
-
Size
84KB
-
Sample
241024-299yqsxdle
-
MD5
753c707e47bce65d32be781ea1584e0b
-
SHA1
7b43f6a910b01553dfae51560570365e3ce9ed42
-
SHA256
b1c0e35f47273a236518f43ee56c0367d8b423ca9ed8f9e7ad4a875caa47bb69
-
SHA512
8afc2ebbc80e17e42317202e9479e0c223456cf9f0b22ccdf9fe486eff19ebf9a33a2e00c01aa81168d4ad9950c34c8d78dc2f5821702fe61874221088d3cdda
-
SSDEEP
1536:2ppfa5dJy8Cgrw7rPNDwhucaDlZ5gb0HI//4gQF0eCaL:3yIwmhuDlZWbcO4/waL
Static task
static1
Behavioral task
behavioral1
Sample
753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
753c707e47bce65d32be781ea1584e0b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
NYAN CAT
narotomagic.publicvm.com:6663
a728eeadc9774101a351e2a5b3fe9598
-
reg_key
a728eeadc9774101a351e2a5b3fe9598
-
splitter
|'|'|
Targets
-
-
Target
753c707e47bce65d32be781ea1584e0b_JaffaCakes118
-
Size
84KB
-
MD5
753c707e47bce65d32be781ea1584e0b
-
SHA1
7b43f6a910b01553dfae51560570365e3ce9ed42
-
SHA256
b1c0e35f47273a236518f43ee56c0367d8b423ca9ed8f9e7ad4a875caa47bb69
-
SHA512
8afc2ebbc80e17e42317202e9479e0c223456cf9f0b22ccdf9fe486eff19ebf9a33a2e00c01aa81168d4ad9950c34c8d78dc2f5821702fe61874221088d3cdda
-
SSDEEP
1536:2ppfa5dJy8Cgrw7rPNDwhucaDlZ5gb0HI//4gQF0eCaL:3yIwmhuDlZWbcO4/waL
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-