General
-
Target
JaffaCakes118_1e26425e2d9093444f439c7fc8ff6fa6
-
Size
331KB
-
Sample
241231-qlc4bavjgp
-
MD5
1e26425e2d9093444f439c7fc8ff6fa6
-
SHA1
1295e8b827b873bdcf1a00829ccfc5127baf17ac
-
SHA256
177e5e6fffcf864132a249ed93317f82696cad1262b87d0d8d5c1325f9417a76
-
SHA512
781deeadeb45641aa7c1c460cd85e230d78fbe5af412eb1fc61513a0b801304384418f27e4ba7452f7175d5ea737e219c0d1267a679ec42742d7874a28d26f2d
-
SSDEEP
1536:A6MOnxTaogXfz3OJ9rUrTvQEv4o6Ja8KDtI:8ZfQEAo6w8GI
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1e26425e2d9093444f439c7fc8ff6fa6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1e26425e2d9093444f439c7fc8ff6fa6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
64f5a500033a0279ebf3a243f9f3365c
-
reg_key
64f5a500033a0279ebf3a243f9f3365c
-
splitter
|'|'|
Targets
-
-
Target
JaffaCakes118_1e26425e2d9093444f439c7fc8ff6fa6
-
Size
331KB
-
MD5
1e26425e2d9093444f439c7fc8ff6fa6
-
SHA1
1295e8b827b873bdcf1a00829ccfc5127baf17ac
-
SHA256
177e5e6fffcf864132a249ed93317f82696cad1262b87d0d8d5c1325f9417a76
-
SHA512
781deeadeb45641aa7c1c460cd85e230d78fbe5af412eb1fc61513a0b801304384418f27e4ba7452f7175d5ea737e219c0d1267a679ec42742d7874a28d26f2d
-
SSDEEP
1536:A6MOnxTaogXfz3OJ9rUrTvQEv4o6Ja8KDtI:8ZfQEAo6w8GI
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1