General
-
Target
e89734cb5f03a7205150c1dd2b63f482_JaffaCakes118
-
Size
1.3MB
-
Sample
241212-2hp49azkfz
-
MD5
e89734cb5f03a7205150c1dd2b63f482
-
SHA1
e13bcecf89bd561fa0dee793c7768e7d905997b4
-
SHA256
da6f282bda21ae7d7672b12038088c5683f4b6c05f651bb8bcce0e50330cd7f0
-
SHA512
a43373f0d5ef35317f9ccbd4b5a3269c2fa4ae2247f509e148fe73fd8a0a6a36111b2286bd76553d63696878761a863c536f3b48d8e934953bd9f96a7c39d75c
-
SSDEEP
24576:9Lf44W9ESiWy9EFFTZdXTZdHXTZdXTZzyQHqVE008sWVmiXMf7OM4pWC7FdT59Dl:uiSTZdXTZdHXTZdXTZzyQKVE0zmDI
Static task
static1
Behavioral task
behavioral1
Sample
e89734cb5f03a7205150c1dd2b63f482_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e89734cb5f03a7205150c1dd2b63f482_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v2.0
HacKed
62.227.124.106:5552
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
e89734cb5f03a7205150c1dd2b63f482_JaffaCakes118
-
Size
1.3MB
-
MD5
e89734cb5f03a7205150c1dd2b63f482
-
SHA1
e13bcecf89bd561fa0dee793c7768e7d905997b4
-
SHA256
da6f282bda21ae7d7672b12038088c5683f4b6c05f651bb8bcce0e50330cd7f0
-
SHA512
a43373f0d5ef35317f9ccbd4b5a3269c2fa4ae2247f509e148fe73fd8a0a6a36111b2286bd76553d63696878761a863c536f3b48d8e934953bd9f96a7c39d75c
-
SSDEEP
24576:9Lf44W9ESiWy9EFFTZdXTZdHXTZdXTZzyQHqVE008sWVmiXMf7OM4pWC7FdT59Dl:uiSTZdXTZdHXTZdXTZzyQKVE0zmDI
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1