General
-
Target
JaffaCakes118_1249a130226433cade7ba31890f6f37c
-
Size
268KB
-
Sample
241231-lp9jgavkez
-
MD5
1249a130226433cade7ba31890f6f37c
-
SHA1
4012785a1ae0cf850f879f07744431a73edc1560
-
SHA256
aee4566c0079232220d05027859303ac5f76a6db6a1ee2ee8946f68bc9ac889d
-
SHA512
ca649cbfc7f10d47b56d2f53c8bc52fce92bb1705c0be5f91205448b683e332863acec8cc48d0581ad9f19ec774fb4c8b23a16a42ae3fa853b5db34b4167c8bb
-
SSDEEP
3072:U2ejuzN8baRYX2NCanoHXoJyWs12WD9Erugvntaxw9:Tej4EF4uRxw
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1249a130226433cade7ba31890f6f37c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1249a130226433cade7ba31890f6f37c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
anonymous1999.hopto.org:4444
9501956304f9daf11a329e0e62d89787
-
reg_key
9501956304f9daf11a329e0e62d89787
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_1249a130226433cade7ba31890f6f37c
-
Size
268KB
-
MD5
1249a130226433cade7ba31890f6f37c
-
SHA1
4012785a1ae0cf850f879f07744431a73edc1560
-
SHA256
aee4566c0079232220d05027859303ac5f76a6db6a1ee2ee8946f68bc9ac889d
-
SHA512
ca649cbfc7f10d47b56d2f53c8bc52fce92bb1705c0be5f91205448b683e332863acec8cc48d0581ad9f19ec774fb4c8b23a16a42ae3fa853b5db34b4167c8bb
-
SSDEEP
3072:U2ejuzN8baRYX2NCanoHXoJyWs12WD9Erugvntaxw9:Tej4EF4uRxw
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1