General
-
Target
JaffaCakes118_e3628c6c6461b4df628ab0d7c8977d109d5906aec469ec8d1dec8372c956862a
-
Size
93KB
-
Sample
241229-d5p6rs1pbk
-
MD5
943ad62c5ce7252307522fba42ac0ad0
-
SHA1
3ab8fe8d2b082f5009f8e735e6cef24f70c81414
-
SHA256
e3628c6c6461b4df628ab0d7c8977d109d5906aec469ec8d1dec8372c956862a
-
SHA512
d831ac60fd9a62122f7021da8b8c9d9f305cfe9a4a0c08b9b0c6ec930bc22a41ce632c3b58cf3238876fb5d2152ad2ec8a272a6e9fb9145adc410a0416100114
-
SSDEEP
1536:xUIs5p8k2HGjTpL5HoTjEwzGi1dDkDEgS:xUgk2HGjtL5IYi1dK9
Behavioral task
behavioral1
Sample
JaffaCakes118_e3628c6c6461b4df628ab0d7c8977d109d5906aec469ec8d1dec8372c956862a.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e3628c6c6461b4df628ab0d7c8977d109d5906aec469ec8d1dec8372c956862a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
hakim32.ddns.net:2000
127.0.0.1:58905
52b910a105f9b42a0c58d241595617ce
-
reg_key
52b910a105f9b42a0c58d241595617ce
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_e3628c6c6461b4df628ab0d7c8977d109d5906aec469ec8d1dec8372c956862a
-
Size
93KB
-
MD5
943ad62c5ce7252307522fba42ac0ad0
-
SHA1
3ab8fe8d2b082f5009f8e735e6cef24f70c81414
-
SHA256
e3628c6c6461b4df628ab0d7c8977d109d5906aec469ec8d1dec8372c956862a
-
SHA512
d831ac60fd9a62122f7021da8b8c9d9f305cfe9a4a0c08b9b0c6ec930bc22a41ce632c3b58cf3238876fb5d2152ad2ec8a272a6e9fb9145adc410a0416100114
-
SSDEEP
1536:xUIs5p8k2HGjTpL5HoTjEwzGi1dDkDEgS:xUgk2HGjtL5IYi1dK9
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1