General
-
Target
fcfc0891e383dd78bea0b738b2771643_JaffaCakes118
-
Size
1.6MB
-
Sample
241218-y6cmaazra1
-
MD5
fcfc0891e383dd78bea0b738b2771643
-
SHA1
2d6e58beac2275d8f23d5cdcec08af3b82123376
-
SHA256
c6af10736db72c425555f5e62b2b954fceb9d541aa8dd593bb0f1ca91c9a9b52
-
SHA512
6c617c3c519580ca79841139ba85864d0a8339251cf8b75654effc71dbbc2ac42be76df8fe809ff8f52a65254495b6a69f157b7a5029192c53d034973e89dbcc
-
SSDEEP
49152:ch+ZkldoPKi2a9D5SOgTjjhKQVHoF/uY:N2cPKi15SThPVIF
Static task
static1
Behavioral task
behavioral1
Sample
fcfc0891e383dd78bea0b738b2771643_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
njrat
0.7d
soft
googlyoutuob.ddns.net:1177
5e9d00b3a9bfb0f9311b1d29c32b918a
-
reg_key
5e9d00b3a9bfb0f9311b1d29c32b918a
-
splitter
|'|'|
Targets
-
-
Target
fcfc0891e383dd78bea0b738b2771643_JaffaCakes118
-
Size
1.6MB
-
MD5
fcfc0891e383dd78bea0b738b2771643
-
SHA1
2d6e58beac2275d8f23d5cdcec08af3b82123376
-
SHA256
c6af10736db72c425555f5e62b2b954fceb9d541aa8dd593bb0f1ca91c9a9b52
-
SHA512
6c617c3c519580ca79841139ba85864d0a8339251cf8b75654effc71dbbc2ac42be76df8fe809ff8f52a65254495b6a69f157b7a5029192c53d034973e89dbcc
-
SSDEEP
49152:ch+ZkldoPKi2a9D5SOgTjjhKQVHoF/uY:N2cPKi15SThPVIF
-
Njrat family
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-