General
-
Target
JaffaCakes118_f8333a5ed0e285bec1e3a5530e14f063fd01e98584498c9f82351b670831b47d
-
Size
136KB
-
Sample
241225-qctppstlgv
-
MD5
c6ccc7f2cd35af8acc1e5fd9a82e3f76
-
SHA1
55f8cd19286be1f26441b8a1a3917b0771b7207c
-
SHA256
f8333a5ed0e285bec1e3a5530e14f063fd01e98584498c9f82351b670831b47d
-
SHA512
0e5cd488811f99e49d85e1f48db8a20b02c4e150973cf75cc706fc0f6d12114f30b1e325c206acdabc3941dece30e689e00f5610615b2e209c21772a1982048e
-
SSDEEP
768:J+P5TZ38fhCVz0tGxrM+rMRa8NuxintVJGX1LwB7iwQYXoAi2HhcM:J4TZsJCVz0Ai+gRJNoigX
Behavioral task
behavioral1
Sample
JaffaCakes118_f8333a5ed0e285bec1e3a5530e14f063fd01e98584498c9f82351b670831b47d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f8333a5ed0e285bec1e3a5530e14f063fd01e98584498c9f82351b670831b47d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
im523
HacKed
4.tcp.eu.ngrok.io:17275
79fd7f8597e22b0028e3aa50a7a04325
-
reg_key
79fd7f8597e22b0028e3aa50a7a04325
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_f8333a5ed0e285bec1e3a5530e14f063fd01e98584498c9f82351b670831b47d
-
Size
136KB
-
MD5
c6ccc7f2cd35af8acc1e5fd9a82e3f76
-
SHA1
55f8cd19286be1f26441b8a1a3917b0771b7207c
-
SHA256
f8333a5ed0e285bec1e3a5530e14f063fd01e98584498c9f82351b670831b47d
-
SHA512
0e5cd488811f99e49d85e1f48db8a20b02c4e150973cf75cc706fc0f6d12114f30b1e325c206acdabc3941dece30e689e00f5610615b2e209c21772a1982048e
-
SSDEEP
768:J+P5TZ38fhCVz0tGxrM+rMRa8NuxintVJGX1LwB7iwQYXoAi2HhcM:J4TZsJCVz0Ai+gRJNoigX
-
Modifies Windows Firewall
-
Drops startup file
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1