General
-
Target
7ce38ca1af6a85849b900bb467e35da4_JaffaCakes118
-
Size
31KB
-
Sample
241029-116dhsskgn
-
MD5
7ce38ca1af6a85849b900bb467e35da4
-
SHA1
45b5279f25ea7866b12bf9e02caf88dd8eba0629
-
SHA256
edc6b8ca1076f0c004d7873f4079b4ba8f8a4f35c47c2baadca8e5ac48a91100
-
SHA512
00db955af5530aa8e0eb0bb0cd4062c2aa4b5833b47678ceb26f1d440bfc7045f536888b525fd1879ad809943a99a0d4365101cb4e5e364ed809771086ded0ad
-
SSDEEP
768:s5Ve4vSNzj9REzxv6/v5H3QI8tvaGQmIDUu0tikKj:cv4zq9JlQVkaj
Behavioral task
behavioral1
Sample
7ce38ca1af6a85849b900bb467e35da4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ce38ca1af6a85849b900bb467e35da4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HACK CROSSFIRE
snowgato.duckdns.org:1177
d1bdedbb684e4a7e51ad819088373ddd
-
reg_key
d1bdedbb684e4a7e51ad819088373ddd
-
splitter
Y262SUCZ4UJJ
Targets
-
-
Target
7ce38ca1af6a85849b900bb467e35da4_JaffaCakes118
-
Size
31KB
-
MD5
7ce38ca1af6a85849b900bb467e35da4
-
SHA1
45b5279f25ea7866b12bf9e02caf88dd8eba0629
-
SHA256
edc6b8ca1076f0c004d7873f4079b4ba8f8a4f35c47c2baadca8e5ac48a91100
-
SHA512
00db955af5530aa8e0eb0bb0cd4062c2aa4b5833b47678ceb26f1d440bfc7045f536888b525fd1879ad809943a99a0d4365101cb4e5e364ed809771086ded0ad
-
SSDEEP
768:s5Ve4vSNzj9REzxv6/v5H3QI8tvaGQmIDUu0tikKj:cv4zq9JlQVkaj
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1