General
-
Target
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118
-
Size
27KB
-
Sample
241030-zlk9cs1cqd
-
MD5
8053e8d64be8f8296c3dbd269c0aba41
-
SHA1
f7063edbe53d30fef2b228b3fe15a243cd39e358
-
SHA256
8667fa7a0ac2e78989cc8e886ad752cc26cf6da40ecb951a102cce3577656894
-
SHA512
bae7676616dcd55db5a032ce93d6b7a809994454e25b0de0d854ef4685b3e540799bdfefc9c93175d90fcd89ae52530cb85b9d9b0ebf609f1b309b06ef4f05aa
-
SSDEEP
384:QLRQKJ3buZjmgERA40DwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcaJ:O2K5buQE40fLFA/vMHTi9bD
Behavioral task
behavioral1
Sample
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
185.195.232.248:54977
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
8053e8d64be8f8296c3dbd269c0aba41_JaffaCakes118
-
Size
27KB
-
MD5
8053e8d64be8f8296c3dbd269c0aba41
-
SHA1
f7063edbe53d30fef2b228b3fe15a243cd39e358
-
SHA256
8667fa7a0ac2e78989cc8e886ad752cc26cf6da40ecb951a102cce3577656894
-
SHA512
bae7676616dcd55db5a032ce93d6b7a809994454e25b0de0d854ef4685b3e540799bdfefc9c93175d90fcd89ae52530cb85b9d9b0ebf609f1b309b06ef4f05aa
-
SSDEEP
384:QLRQKJ3buZjmgERA40DwoyumGPiJRjMFAQk93vmhm7UMKmIEecKdbXTzm9bVhcaJ:O2K5buQE40fLFA/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1