General
-
Target
c87001299a6b8f5e31816b5fe5689f77_JaffaCakes118
-
Size
43KB
-
Sample
241205-tcqjtsxmfq
-
MD5
c87001299a6b8f5e31816b5fe5689f77
-
SHA1
0f9dd0039bd8e59f153b9fee598f97eb21e0677c
-
SHA256
1788872a46f28d6e1593df23c4502bc5834b9f41f9e544b74848aea6913939ba
-
SHA512
bcbd0f94f17f60a9ab894077f23afe165a423abcc046e6edcc58860b8fbe01b47f221749a6af630abdab06443388986667639075e724ace7f82a627078ee97ba
-
SSDEEP
384:2Zy0KNUst+3gUy6L7nCCCE8b9JszQIij+ZsNO3PlpJKkkjh/TzF7pWnL0greT0pe:s8wQh6PnlWbuuXQ/oCQ+L
Behavioral task
behavioral1
Sample
c87001299a6b8f5e31816b5fe5689f77_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c87001299a6b8f5e31816b5fe5689f77_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
dolbaeb@
aronakich.ddns.net:5552
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
c87001299a6b8f5e31816b5fe5689f77_JaffaCakes118
-
Size
43KB
-
MD5
c87001299a6b8f5e31816b5fe5689f77
-
SHA1
0f9dd0039bd8e59f153b9fee598f97eb21e0677c
-
SHA256
1788872a46f28d6e1593df23c4502bc5834b9f41f9e544b74848aea6913939ba
-
SHA512
bcbd0f94f17f60a9ab894077f23afe165a423abcc046e6edcc58860b8fbe01b47f221749a6af630abdab06443388986667639075e724ace7f82a627078ee97ba
-
SSDEEP
384:2Zy0KNUst+3gUy6L7nCCCE8b9JszQIij+ZsNO3PlpJKkkjh/TzF7pWnL0greT0pe:s8wQh6PnlWbuuXQ/oCQ+L
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1