General
-
Target
JaffaCakes118_a412582126a26088567044df41ee0d6e749bd7d7a0cbc375fc7628c7424ffe23
-
Size
12KB
-
Sample
241226-xctg9svkcx
-
MD5
1353d0ce732424cd2c6b006d9386b01a
-
SHA1
227d840f5ccee27295de72a5d50133b1d87db4de
-
SHA256
a412582126a26088567044df41ee0d6e749bd7d7a0cbc375fc7628c7424ffe23
-
SHA512
423f94c0f752cde14738a27eeabf6846b8a4c4140b8980cade73cbc50075c685e543e1c52f0e4b480a5206150c5fa68ecc87144c96d6f70176d4873153fb9c40
-
SSDEEP
192:JESvomo8MwQYlKpzm3KO4t8TIYrvQtLWhgwn8lUe4mpRf2NFMQNKqMsFxqe+y5:mAhHQYlKpGKOmYpsdUg6IZzQNFz5
Behavioral task
behavioral1
Sample
8f04eb500e66a053fa3e6e8a9900e94e794218253a172265c3a881db6f65faf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f04eb500e66a053fa3e6e8a9900e94e794218253a172265c3a881db6f65faf4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
v4.0
HacKed
216.250.251.104:2028
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
8f04eb500e66a053fa3e6e8a9900e94e794218253a172265c3a881db6f65faf4
-
Size
27KB
-
MD5
47bea8a28b1e81e3342d594fc57acd8e
-
SHA1
d301e8985e53b7baabf9b45df087a017e3817742
-
SHA256
8f04eb500e66a053fa3e6e8a9900e94e794218253a172265c3a881db6f65faf4
-
SHA512
d5f2bfa425fa0c8d7fe2531b57ed9dbe5ca9b8bb8b7a868e39b251182446a22bcf01c3181d17b3362bc2a76b56cda1e504db2436fafbf922ee2120f76e8d00b6
-
SSDEEP
384:2LBH6uj/+AU9038hfOexuaP39hRnMYAQk93vmhm7UMKmIEecKdbXTzm9bVhcaL62:wBa0mkspJtyYA/vMHTi9bD
Score10/10-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1